DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Using chroot to Restrict Linux Applications for Enhanced Security

Using chroot to Restrict Linux Applications for Enhanced Security

1
Comments
4 min read
AWS IAM Management Best Practices: Structured Approaches for Scalable Access Control

AWS IAM Management Best Practices: Structured Approaches for Scalable Access Control

Comments
3 min read
How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

Comments
1 min read
Assessing Security Risks of Open Source Repos

Assessing Security Risks of Open Source Repos

Comments
2 min read
A Backend Engineer's Guide to Not Getting Hacked

A Backend Engineer's Guide to Not Getting Hacked

Comments
9 min read
🔐 Are Your Passwords Ready for the Quantum Age?

🔐 Are Your Passwords Ready for the Quantum Age?

1
Comments
2 min read
"End-to-End SonarQube Integration with GitLab CI/CD for DevSecOps Pipelines"

"End-to-End SonarQube Integration with GitLab CI/CD for DevSecOps Pipelines"

Comments
1 min read
No More Sneaky Uploads : How I Made My Node.js App Virus-Free🛡️🦠

No More Sneaky Uploads : How I Made My Node.js App Virus-Free🛡️🦠

Comments
1 min read
Cybr - [LAB] [Challenge] Create a VPC with public and private subnets

Cybr - [LAB] [Challenge] Create a VPC with public and private subnets

Comments
9 min read
Instantly Verify Faces & Liveness with One API — Identity Checks Made Simple with AI

Instantly Verify Faces & Liveness with One API — Identity Checks Made Simple with AI

11
Comments 1
2 min read
🔒 Understanding Uniface's "partner" Modifier: Controlling Component Visibility

🔒 Understanding Uniface's "partner" Modifier: Controlling Component Visibility

Comments
2 min read
Level Up Your NGINX Skills with These 6 Configurations

Level Up Your NGINX Skills with These 6 Configurations

4
Comments
4 min read
Security news weekly round-up - 18th July 2025

Security news weekly round-up - 18th July 2025

1
Comments
5 min read
🔥 The Agent Registry Is a Trojan Horse

🔥 The Agent Registry Is a Trojan Horse

8
Comments 1
2 min read
Secure SSH Access with Modular Policy Files

Secure SSH Access with Modular Policy Files

1
Comments
5 min read
Top 10 Web Application Penetration Testing Tools

Top 10 Web Application Penetration Testing Tools

1
Comments 2
9 min read
Provide shared file storage for the company offices

Provide shared file storage for the company offices

Comments
5 min read
How Hackers Are Using AI in 2025 (Urgent Attention)

How Hackers Are Using AI in 2025 (Urgent Attention)

6
Comments 1
6 min read
How to setup Corporate Identity Access at scale in AWS?

How to setup Corporate Identity Access at scale in AWS?

Comments
5 min read
Top Apple Device Management Software for 2025 | Easy & Secure

Top Apple Device Management Software for 2025 | Easy & Secure

Comments
4 min read
Mastering Docker from Scratch to Scale – A Hands-On Guide with Labs, CI/CD, Security & DCA Prep

Mastering Docker from Scratch to Scale – A Hands-On Guide with Labs, CI/CD, Security & DCA Prep

Comments
2 min read
Sessions vs JWTs: Not Just Two Ways to Authenticate

Sessions vs JWTs: Not Just Two Ways to Authenticate

Comments 1
4 min read
Forensic Walkthrough: Decoding the ResupplyFi Attack Contract

Forensic Walkthrough: Decoding the ResupplyFi Attack Contract

Comments
3 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js: script-src and connect-src

Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js: script-src and connect-src

1
Comments
3 min read
A Summer of Security: How Google’s AI-Led Cybersecurity Push Is Changing the Game

A Summer of Security: How Google’s AI-Led Cybersecurity Push Is Changing the Game

5
Comments
4 min read
loading...