DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Stuff we shipped in July

Stuff we shipped in July

4
Comments 1
1 min read
Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

5
Comments
4 min read
Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)

Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)

3
Comments 1
3 min read
Implementing Secure Breakglass Access for ArgoCD with Vault, External Secrets, and Terraform

Implementing Secure Breakglass Access for ArgoCD with Vault, External Secrets, and Terraform

2
Comments
3 min read
Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

4
Comments
3 min read
Hardening BĂĄsico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

Hardening BĂĄsico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

1
Comments
3 min read
Securing MCP Servers

Securing MCP Servers

4
Comments
8 min read
How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

6
Comments
3 min read
How to Create a Read-Only User in PostgreSQL (With Access to Statistics)

How to Create a Read-Only User in PostgreSQL (With Access to Statistics)

1
Comments
2 min read
CĂłmo crear un usuario de solo lectura en PostgreSQL (con acceso a estadĂ­sticas)

CĂłmo crear un usuario de solo lectura en PostgreSQL (con acceso a estadĂ­sticas)

Comments
3 min read
Access and Refresh Tokens in Token-Based Authentication

Access and Refresh Tokens in Token-Based Authentication

19
Comments 1
6 min read
GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

5
Comments
19 min read
How to Secure SSH Access with Short-Lived Certificates

How to Secure SSH Access with Short-Lived Certificates

1
Comments
4 min read
The Tea app data breach: What really happened?

The Tea app data breach: What really happened?

Comments
2 min read
☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements

☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements

19
Comments 9
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.