DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CodeMash 2025: A Community Conversation About NHI And Secrets Security

CodeMash 2025: A Community Conversation About NHI And Secrets Security

Comments
7 min read
System Security Concepts

System Security Concepts

1
Comments 2
4 min read
Content Security Policy: Your Website's Unsung Hero

Content Security Policy: Your Website's Unsung Hero

7
Comments
2 min read
How to Set Up Two-Factor Authentication on WordPress Without Plugin

How to Set Up Two-Factor Authentication on WordPress Without Plugin

5
Comments
4 min read
Quick Cookie Management Tips

Quick Cookie Management Tips

Comments
3 min read
I built this free tool so IT teams can customize and streamline their employee offboarding

I built this free tool so IT teams can customize and streamline their employee offboarding

Comments
1 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

Comments
2 min read
OpenTofu - Encrypted State + Git to Bootstrap Infrastructure

OpenTofu - Encrypted State + Git to Bootstrap Infrastructure

Comments
5 min read
A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

Comments
4 min read
Quick Cookie Management Tips

Quick Cookie Management Tips

Comments 1
3 min read
Unlocking Digital Safety: Must-Know Protocols to Protect Your Online World

Unlocking Digital Safety: Must-Know Protocols to Protect Your Online World

Comments
3 min read
Understanding the STRIDE Function in Cybersecurity

Understanding the STRIDE Function in Cybersecurity

Comments
3 min read
AWS security and compliance

AWS security and compliance

Comments 1
1 min read
Top Infrastructure as Code Security Tools in 2025

Top Infrastructure as Code Security Tools in 2025

Comments
8 min read
Post-Quantum Cryptography

Post-Quantum Cryptography

Comments
2 min read
Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

23
Comments 13
4 min read
Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Looking for potential vulnerabilities in code, part 2: practice

Looking for potential vulnerabilities in code, part 2: practice

Comments 2
14 min read
How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

Comments
2 min read
Data Privacy in the API Economy: Balancing Innovation with Security

Data Privacy in the API Economy: Balancing Innovation with Security

16
Comments 1
6 min read
Tech innovator

Tech innovator

Comments
1 min read
Granting User Access to Unraid Shares

Granting User Access to Unraid Shares

Comments
2 min read
Creating a User in Unraid for Secure Access

Creating a User in Unraid for Secure Access

Comments
1 min read
Setting up TLS connection for containerized PostgreSQL database

Setting up TLS connection for containerized PostgreSQL database

4
Comments
4 min read
loading...