DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Largest NPM Supply Chain Attack Ever and How to Defend Against It

The Largest NPM Supply Chain Attack Ever and How to Defend Against It

Comments 1
5 min read
Access Your Local Ollama Models from Anywhere: Port 11434 Made Simple

Access Your Local Ollama Models from Anywhere: Port 11434 Made Simple

6
Comments
3 min read
🍎 From UTXOs to SegWit: How Bitcoin Fixed Transaction Malleability and Lowered Fees

🍎 From UTXOs to SegWit: How Bitcoin Fixed Transaction Malleability and Lowered Fees

Comments
2 min read
Privileged: A Powerful Authorization Library for .NET

Privileged: A Powerful Authorization Library for .NET

Comments
4 min read
The Ultimate Checklist for TLS Hardening on Nginx Servers

The Ultimate Checklist for TLS Hardening on Nginx Servers

Comments 1
3 min read
Why eFuses Matter in Firmware Security: Permanent Storage, Anti-Rollback, and Device Identity

Why eFuses Matter in Firmware Security: Permanent Storage, Anti-Rollback, and Device Identity

6
Comments
4 min read
The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

20
Comments 4
4 min read
Building HIPAA-Compliant Healthcare Apps: Best Practices

Building HIPAA-Compliant Healthcare Apps: Best Practices

Comments
5 min read
Securely Configuring Azure Blob Storage in .NET Web API

Securely Configuring Azure Blob Storage in .NET Web API

1
Comments
3 min read
🚀 Secure Your Flutter Apps Like a Pro! 🔐

🚀 Secure Your Flutter Apps Like a Pro! 🔐

1
Comments
1 min read
SSL: Your Website's Digital Seatbelt 🔒

SSL: Your Website's Digital Seatbelt 🔒

Comments
5 min read
Private Certificate Authorities: Building Trust Inside Your Organization

Private Certificate Authorities: Building Trust Inside Your Organization

1
Comments
7 min read
Lock Down Your Data: Implement Row-Level Security Policies in Supabase SQL

Lock Down Your Data: Implement Row-Level Security Policies in Supabase SQL

8
Comments
13 min read
Python Logging Best Practices - Obvious and Not-So-Obvious

Python Logging Best Practices - Obvious and Not-So-Obvious

5
Comments
10 min read
Fantastic AWS Policies and Where to Find Them

Fantastic AWS Policies and Where to Find Them

2
Comments 1
9 min read
5 Fatal Mistakes: Why Your AI Agent Keeps Failing in Production

5 Fatal Mistakes: Why Your AI Agent Keeps Failing in Production

1
Comments
4 min read
Choosing a Workspace for AI Agents: The Ultimate Showdown Between gVisor, Kata, and Firecracker

Choosing a Workspace for AI Agents: The Ultimate Showdown Between gVisor, Kata, and Firecracker

1
Comments
5 min read
🔐Security-Proofing My Full Stack App Against XSS Attacks (Cross-Site Scripting)

🔐Security-Proofing My Full Stack App Against XSS Attacks (Cross-Site Scripting)

6
Comments 2
2 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Comments
3 min read
Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Comments
10 min read
Kubernetes Security Book (2nd Edition) — A Synthesis

Kubernetes Security Book (2nd Edition) — A Synthesis

2
Comments 2
5 min read
Beyond Checksums: Securing File Transfers with HMAC-SHA256

Beyond Checksums: Securing File Transfers with HMAC-SHA256

Comments
3 min read
Derived Identity and System Personalization: A Vision Toward the Physical-Digital Link Through Robust Cryptography

Derived Identity and System Personalization: A Vision Toward the Physical-Digital Link Through Robust Cryptography

2
Comments
4 min read
Outil de Cybersécurité du Jour - Aug 21, 2025

Outil de Cybersécurité du Jour - Aug 21, 2025

Comments
3 min read
How to Achieve Safe Compliance and Security in Fintech with Cloud Standards

How to Achieve Safe Compliance and Security in Fintech with Cloud Standards

Comments
4 min read
loading...