DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity for Game Developers: How to Protect Your Projects from Cyber Threats

Cybersecurity for Game Developers: How to Protect Your Projects from Cyber Threats

Comments
6 min read
🐳 Enterprise-Grade Containerization for Node.js Backends

🐳 Enterprise-Grade Containerization for Node.js Backends

Comments
5 min read
EnvSecOps: Nix, Recognized: The Strongest Bag Wins

EnvSecOps: Nix, Recognized: The Strongest Bag Wins

4
Comments
2 min read
The Secret to Secure Cloud Access from Restricted Regions: Reverse Proxy Everything

The Secret to Secure Cloud Access from Restricted Regions: Reverse Proxy Everything

Comments
3 min read
🔐 PCI DSS Compliance in Mobile Payment Systems

🔐 PCI DSS Compliance in Mobile Payment Systems

Comments
10 min read
Achieving Least Privilege in Docker

Achieving Least Privilege in Docker

3
Comments
5 min read
How to Secure Your ASP.NET Web API with JWT Bearer Authentication (Step-by-Step Guide)

How to Secure Your ASP.NET Web API with JWT Bearer Authentication (Step-by-Step Guide)

Comments
10 min read
How I Built a Django Honeypot to Catch Attackers (and What I Learned)

How I Built a Django Honeypot to Catch Attackers (and What I Learned)

3
Comments
2 min read
🧭 Runbook: Como Rodar um Playbook Ansible com Pipeline CI/CD e SSH via Bastion

🧭 Runbook: Como Rodar um Playbook Ansible com Pipeline CI/CD e SSH via Bastion

Comments
5 min read
EnvSecOps - What It Actually Is (And Why DevSecOps Won't Cut It)

EnvSecOps - What It Actually Is (And Why DevSecOps Won't Cut It)

Comments
3 min read
The 5 Steps of Threat Modeling in a Startup

The 5 Steps of Threat Modeling in a Startup

1
Comments
3 min read
Your AI Chatbot Just Leaked Customer Data to OpenAI. Here’s How it Happened and How to Prevent it

Your AI Chatbot Just Leaked Customer Data to OpenAI. Here’s How it Happened and How to Prevent it

Comments
33 min read
How I Overlooked the Problem and Shot Myself in the Foot

How I Overlooked the Problem and Shot Myself in the Foot

8
Comments 1
4 min read
Practical Ways to Handle Multiple Secrets in Docker Compose—File-Style Without Swarm

Practical Ways to Handle Multiple Secrets in Docker Compose—File-Style Without Swarm

4
Comments
2 min read
interview questions and answers

interview questions and answers

2
Comments
18 min read
CloudFormation change set privilege escalation

CloudFormation change set privilege escalation

6
Comments
3 min read
I Built a CLI to Test Supabase RLS Policies

I Built a CLI to Test Supabase RLS Policies

1
Comments
1 min read
Security Principles | TryHackMe Write-Up

Security Principles | TryHackMe Write-Up

Comments
5 min read
When a Plugin Update Wiped Out Our Site — and Taught Us a Painful Lesson

When a Plugin Update Wiped Out Our Site — and Taught Us a Painful Lesson

Comments
2 min read
Smart Security Camera

Smart Security Camera

Comments
2 min read
5 Common Security Mistakes Developers Still Make (and How to Fix Them)

5 Common Security Mistakes Developers Still Make (and How to Fix Them)

2
Comments
5 min read
EnvSecOps: The Painfully Obvious Path Forward

EnvSecOps: The Painfully Obvious Path Forward

Comments
4 min read
The App You Trust Most Is the One That Spies the Hardest

The App You Trust Most Is the One That Spies the Hardest

10
Comments
8 min read
Cybersecurity Steganography: How Defenders Face Hidden Data

Cybersecurity Steganography: How Defenders Face Hidden Data

Comments
3 min read
How Simple IDs Can Leak Your Secrets

How Simple IDs Can Leak Your Secrets

Comments
3 min read
loading...