DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Ephemeral Resources in Terraform Matter: How MyCoCo Eliminated Secrets from State Files

Why Ephemeral Resources in Terraform Matter: How MyCoCo Eliminated Secrets from State Files

1
Comments
4 min read
Shai-Hulud: a self-propagating npm worm hits @ctrl/tinycolor and dozens more packages

Shai-Hulud: a self-propagating npm worm hits @ctrl/tinycolor and dozens more packages

2
Comments
2 min read
⚡ Mastering Java Exceptions: From Beginner to Bug-Slayer 🚀

⚡ Mastering Java Exceptions: From Beginner to Bug-Slayer 🚀

1
Comments
3 min read
Firewalld: The Modern Firewall Manager

Firewalld: The Modern Firewall Manager

Comments
4 min read
OIDC: The Web's Universal Passport for Secure Logins

OIDC: The Web's Universal Passport for Secure Logins

1
Comments
4 min read
Facing the Shai-Hulud Worm: Where the Hell is Easystreet?

Facing the Shai-Hulud Worm: Where the Hell is Easystreet?

16
Comments 4
6 min read
The Ultimate Checklist for Securing Your DNS Records Across Cloudflare

The Ultimate Checklist for Securing Your DNS Records Across Cloudflare

1
Comments
3 min read
The Dangerous Comfort of the Checkbox: Why Compliance is Not Security

The Dangerous Comfort of the Checkbox: Why Compliance is Not Security

1
Comments
4 min read
Shifting Security Left: Why DevSecOps is Not Optional Anymore

Shifting Security Left: Why DevSecOps is Not Optional Anymore

1
Comments
3 min read
What is Google AP2 Protocol : Step by Step Guide with Examples

What is Google AP2 Protocol : Step by Step Guide with Examples

2
Comments
5 min read
Examining the impact of npm supply chain attacks on MCP

Examining the impact of npm supply chain attacks on MCP

5
Comments
3 min read
Protecting our EKS Nodes with Wazuh

Protecting our EKS Nodes with Wazuh

38
Comments
7 min read
Best 5 Tools to Help Eliminate CVEs from Container Images

Best 5 Tools to Help Eliminate CVEs from Container Images

Comments
4 min read
Uncovering the Weak Spots: A Guide to AI Security Vulnerabilities

Uncovering the Weak Spots: A Guide to AI Security Vulnerabilities

Comments
9 min read
Making sure your PDF compliance and privacy requirements are met with JoyDoc

Making sure your PDF compliance and privacy requirements are met with JoyDoc

6
Comments
12 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.