DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🧠 “They Don’t Hack Systems—They Hack People: Real Stories of Social Engineering”

🧠 “They Don’t Hack Systems—They Hack People: Real Stories of Social Engineering”

3
Comments
3 min read
From Trust Anchors to SPIFFE IDs: Understanding Linkerd’s Automated Identity Pipeline

From Trust Anchors to SPIFFE IDs: Understanding Linkerd’s Automated Identity Pipeline

Comments
5 min read
TCM Security Post

TCM Security Post

Comments
1 min read
How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

6
Comments 8
7 min read
Understanding CSRF Attacks: Process, Risks, and Protection

Understanding CSRF Attacks: Process, Risks, and Protection

Comments
4 min read
I rolled my own auth

I rolled my own auth

4
Comments 2
1 min read
Windows Device Management: Streamline Your IT Operations

Windows Device Management: Streamline Your IT Operations

Comments
5 min read
SSH Authentication Key Rotation: Why and How to Expire SSH Keys

SSH Authentication Key Rotation: Why and How to Expire SSH Keys

8
Comments
4 min read
The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

11
Comments 2
3 min read
Outtake: Revolutionizing Threat Detection with GPT-4.1

Outtake: Revolutionizing Threat Detection with GPT-4.1

Comments 1
3 min read
CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

1
Comments
1 min read
Authenticate GitHub Actions to Azure using OpenID Connect

Authenticate GitHub Actions to Azure using OpenID Connect

1
Comments
4 min read
Startup Life: From DevOps to Filling Out Compliance Spreadsheets

Startup Life: From DevOps to Filling Out Compliance Spreadsheets

1
Comments
3 min read
Secure Your Spring Boot API with JWT and Role-Based Authorization

Secure Your Spring Boot API with JWT and Role-Based Authorization

Comments
5 min read
Terraforming the Cloud

Terraforming the Cloud

16
Comments 13
2 min read
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Authentication vs Authorization

🔐 Authentication vs Authorization

Comments
1 min read
Six Hat Analysis for Personal Data Security

Six Hat Analysis for Personal Data Security

1
Comments
4 min read
Creating a Kinde workflow to check for malicious IPs during authentication

Creating a Kinde workflow to check for malicious IPs during authentication

10
Comments
6 min read
OpenID: A Comprehensive Guide to Secure Online Authentication

OpenID: A Comprehensive Guide to Secure Online Authentication

1
Comments
3 min read
⚠️ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

⚠️ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

10
Comments 5
1 min read
🔐 Secure Web Application Flow with JWT: From Frontend to Backend

🔐 Secure Web Application Flow with JWT: From Frontend to Backend

Comments
2 min read
Managing Service Accounts in Multicluster Environments with RHACM

Managing Service Accounts in Multicluster Environments with RHACM

Comments
7 min read
How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

10
Comments 2
6 min read
loading...