DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Authentication Flows: Implementing Secure Session Management

Authentication Flows: Implementing Secure Session Management

Comments
2 min read
From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 2

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 2

3
Comments
3 min read
Speed up Docker image builds with cache management

Speed up Docker image builds with cache management

9
Comments
3 min read
What Are Flash Loans?

What Are Flash Loans?

5
Comments
8 min read
From Weeks to Days: Atome’s Real-Time Feature Engineering with RisingWave

From Weeks to Days: Atome’s Real-Time Feature Engineering with RisingWave

Comments
3 min read
How I Built a Free AnyDesk Alternative Using Sunshine, Moonlight & Tailscale

How I Built a Free AnyDesk Alternative Using Sunshine, Moonlight & Tailscale

8
Comments 2
3 min read
MongoDB Vector Search With EF Core

MongoDB Vector Search With EF Core

4
Comments 2
12 min read
How do you get your dev team to shift left by themselves for real?

How do you get your dev team to shift left by themselves for real?

Comments
6 min read
Smart Mutation: Using AI to Fortify JavaScript Engines

Smart Mutation: Using AI to Fortify JavaScript Engines

1
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 17, 2025

Outil de Cybersécurité du Jour - Sep 17, 2025

1
Comments
3 min read
Building a Centralized Authentication Service for Multi-Domain Apps

Building a Centralized Authentication Service for Multi-Domain Apps

3
Comments
1 min read
WTH is openFGA and implementing Role-Based Access Control in GO servers.

WTH is openFGA and implementing Role-Based Access Control in GO servers.

10
Comments 1
6 min read
Part 6: Disaster Recovery, Cost Management, and Future-Proofing

Part 6: Disaster Recovery, Cost Management, and Future-Proofing

10
Comments
4 min read
Rethinking Identity Infrastructure for Autonomous Systems

Rethinking Identity Infrastructure for Autonomous Systems

1
Comments
3 min read
How Are You Preparing for AI-Powered Cyber Threats?

How Are You Preparing for AI-Powered Cyber Threats?

Comments
1 min read
I Scanned 9 Popular AI Coding Tools for Security Issues. Here's What Every Developer Should Know.

I Scanned 9 Popular AI Coding Tools for Security Issues. Here's What Every Developer Should Know.

8
Comments 2
15 min read
How to Deal with MCP “Tool Poisoning”

How to Deal with MCP “Tool Poisoning”

Comments
17 min read
How to use Testcontainers with PostgreSQL and SSL

How to use Testcontainers with PostgreSQL and SSL

Comments
6 min read
Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Comments
8 min read
No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

Comments
7 min read
Cloud Pen Testing Strategies (Azure, AWS)

Cloud Pen Testing Strategies (Azure, AWS)

Comments
5 min read
Automatic deployment via SSH

Automatic deployment via SSH

Comments
2 min read
Secrets Management: Keeping API Keys and Credentials Safe

Secrets Management: Keeping API Keys and Credentials Safe

4
Comments
2 min read
How RSA Works (for Dummies)

How RSA Works (for Dummies)

Comments 2
4 min read
Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Comments
2 min read
loading...