DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AWS IAM POLICIES Deep Dive

AWS IAM POLICIES Deep Dive

1
Comments
4 min read
AWS Security Hub in Action: Expert Strategies for Threat Detection and Compliance

AWS Security Hub in Action: Expert Strategies for Threat Detection and Compliance

Comments
11 min read
Secure Your Spring API With JWT and MongoDB

Secure Your Spring API With JWT and MongoDB

11
Comments 2
13 min read
Securely Send SMS with Twilio, AWS Lambda, and Terraform

Securely Send SMS with Twilio, AWS Lambda, and Terraform

1
Comments
4 min read
Dotenv files annoyed me into writing Polyenv

Dotenv files annoyed me into writing Polyenv

4
Comments 1
7 min read
DOM-based XSS in-depth

DOM-based XSS in-depth

1
Comments 1
6 min read
The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

1
Comments
2 min read
Connections and workflows updates in September

Connections and workflows updates in September

6
Comments
1 min read
Automating SBOM Generation and Vulnerability Analysis

Automating SBOM Generation and Vulnerability Analysis

Comments
4 min read
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

1
Comments
2 min read
Essential JWT Security Best Practices for Developers

Essential JWT Security Best Practices for Developers

19
Comments 6
6 min read
The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

1
Comments
10 min read
Mastering Identity Management in Microsoft Entra ID: From Users to Roles

Mastering Identity Management in Microsoft Entra ID: From Users to Roles

6
Comments
3 min read
How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

1
Comments 1
3 min read
Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.