DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Authentication in Express Using JWT (JSON Web Tokens)

Authentication in Express Using JWT (JSON Web Tokens)

1
Comments 2
2 min read
ToolHive Operator: Multi-Namespace Support for Enhanced Security and Flexibility

ToolHive Operator: Multi-Namespace Support for Enhanced Security and Flexibility

6
Comments 2
4 min read
Easy and secure MCP servers, now on Windows

Easy and secure MCP servers, now on Windows

4
Comments 3
2 min read
Timing Attacks: Why Your Code Might Be Leaking Secrets

Timing Attacks: Why Your Code Might Be Leaking Secrets

2
Comments 2
6 min read
🔐 OAuth 2.0: The Modern Gatekeeper of Secure Authorization

🔐 OAuth 2.0: The Modern Gatekeeper of Secure Authorization

Comments
4 min read
Code Smell 300 - Package Hallucination

Code Smell 300 - Package Hallucination

1
Comments
6 min read
Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Comments
3 min read
A smarter way to use imagePullSecrets in Kubernetes Cluster using ServiceAccounts

A smarter way to use imagePullSecrets in Kubernetes Cluster using ServiceAccounts

7
Comments 1
5 min read
Go Security for Beginners: Understanding and Protecting Your Code

Go Security for Beginners: Understanding and Protecting Your Code

2
Comments 2
5 min read
Security Starts With Developer Enablement: Lessons From PHP TEK 2025

Security Starts With Developer Enablement: Lessons From PHP TEK 2025

1
Comments 2
6 min read
How to Enforce Least Privilege in AWS IAM (Access Analyzer + CloudTrail)

How to Enforce Least Privilege in AWS IAM (Access Analyzer + CloudTrail)

Comments 2
1 min read
API Audits and Security Testing: Best Practices

API Audits and Security Testing: Best Practices

Comments
13 min read
Building an Enterprise-Grade AWS CI/CD Pipeline with Terraform

Building an Enterprise-Grade AWS CI/CD Pipeline with Terraform

25
Comments 2
11 min read
Symmetric, Asymmetric, Hybrid Encryption Explained Simply. How TLS (HTTPS) Works

Symmetric, Asymmetric, Hybrid Encryption Explained Simply. How TLS (HTTPS) Works

Comments
5 min read
Don’t Run That Go Module: The Malware That Wipes Your Linux Disk

Don’t Run That Go Module: The Malware That Wipes Your Linux Disk

3
Comments
2 min read
Permit.io

Permit.io

10
Comments
1 min read
Lockin Company and AFI Sign MOU for Cooperation in the Game Industry

Lockin Company and AFI Sign MOU for Cooperation in the Game Industry

Comments 2
2 min read
Finding and Remediating Idle AWS Databases Made Easy

Finding and Remediating Idle AWS Databases Made Easy

Comments
24 min read
Send reports safely via email(mailbox).

Send reports safely via email(mailbox).

Comments
7 min read
🧠🥷Docker MCP Toolkit and Dokcer MCP Catalog (How to use MCP secure and easy (Cline and Cursor))🛡️

🧠🥷Docker MCP Toolkit and Dokcer MCP Catalog (How to use MCP secure and easy (Cline and Cursor))🛡️

13
Comments 4
2 min read
🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

12
Comments
4 min read
When cert-manager meets essendi xc

When cert-manager meets essendi xc

1
Comments
5 min read
Build a Safe and Simple Login System Using PHP and MySQL – A Complete Step-by-Step Tutorial "

Build a Safe and Simple Login System Using PHP and MySQL – A Complete Step-by-Step Tutorial "

1
Comments
2 min read
🐕 shortio — Secure Links for the Right People, Every Time

🐕 shortio — Secure Links for the Right People, Every Time

38
Comments
2 min read
Safe Data Practices for AI Training & Inference | AI Security series

Safe Data Practices for AI Training & Inference | AI Security series

1
Comments 2
3 min read
loading...