DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Fixing S3 Security Issues: A Practical Remediation Guide

Fixing S3 Security Issues: A Practical Remediation Guide

Comments
9 min read
I Built a Free AWS IAM Activity Tracker Because CloudTrail Alone Isn’t Enough

I Built a Free AWS IAM Activity Tracker Because CloudTrail Alone Isn’t Enough

Comments
6 min read
PHP Attribute: SensitiveParameter

PHP Attribute: SensitiveParameter

1
Comments 1
3 min read
Dify Chatbot Testing Notes

Dify Chatbot Testing Notes

Comments
1 min read
The Grok Precedent: Why AI Creators Are About to Lose Their Legal Shield

The Grok Precedent: Why AI Creators Are About to Lose Their Legal Shield

Comments
6 min read
Understanding Okta Tokens

Understanding Okta Tokens

Comments
2 min read
Building Tamper-Proof Audit Trails: How VCP v1.1's Three-Layer Architecture Addresses €150M in Regulatory Failures

Building Tamper-Proof Audit Trails: How VCP v1.1's Three-Layer Architecture Addresses €150M in Regulatory Failures

1
Comments
15 min read
Building Secure JWT Auth in NestJS: Argon2, Redis Blacklisting, and Token Rotation

Building Secure JWT Auth in NestJS: Argon2, Redis Blacklisting, and Token Rotation

1
Comments
7 min read
Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

1
Comments
4 min read
Alignment Protocol v3.0: Defining Legal Admission Semantics for AI-Controlled Systems

Alignment Protocol v3.0: Defining Legal Admission Semantics for AI-Controlled Systems

Comments
1 min read
EDCA Admission Protocols: Introducing an Explicit Admission Layer for AI Systems

EDCA Admission Protocols: Introducing an Explicit Admission Layer for AI Systems

Comments
2 min read
Beyond the Buzzwords: 5 Counter-Intuitive Lessons in System Design

Beyond the Buzzwords: 5 Counter-Intuitive Lessons in System Design

Comments
7 min read
Automating AWS Security Scanning: Configuring Prowler on EC2 as a Cron Job to Detect Outdated AMIs

Automating AWS Security Scanning: Configuring Prowler on EC2 as a Cron Job to Detect Outdated AMIs

Comments
13 min read
[Learning Notes] [Golang] How to Develop OAuth2 PKCE with Golang - Using LINE Login as an Example

[Learning Notes] [Golang] How to Develop OAuth2 PKCE with Golang - Using LINE Login as an Example

Comments
8 min read
What Backend Developers Should Know About Passkeys (WWDC22)

What Backend Developers Should Know About Passkeys (WWDC22)

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.