DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Threat Modelling with Threat Dragon

Threat Modelling with Threat Dragon

Comments
7 min read
OIDC: The Web's Universal Passport for Secure Logins

OIDC: The Web's Universal Passport for Secure Logins

1
Comments
4 min read
The Dangerous Comfort of the Checkbox: Why Compliance is Not Security

The Dangerous Comfort of the Checkbox: Why Compliance is Not Security

1
Comments
4 min read
Facing the Shai-Hulud Worm: Where the Hell is Easystreet?

Facing the Shai-Hulud Worm: Where the Hell is Easystreet?

16
Comments 4
6 min read
The Ultimate Checklist for Securing Your DNS Records Across Cloudflare

The Ultimate Checklist for Securing Your DNS Records Across Cloudflare

1
Comments
3 min read
Shifting Security Left: Why DevSecOps is Not Optional Anymore

Shifting Security Left: Why DevSecOps is Not Optional Anymore

1
Comments
3 min read
Examining the impact of npm supply chain attacks on MCP

Examining the impact of npm supply chain attacks on MCP

5
Comments
3 min read
Protecting our EKS Nodes with Wazuh

Protecting our EKS Nodes with Wazuh

38
Comments
7 min read
Security Principles

Security Principles

Comments
11 min read
Best 5 Tools to Help Eliminate CVEs from Container Images

Best 5 Tools to Help Eliminate CVEs from Container Images

Comments
4 min read
Cyber Hygiène des grandes entreprises

Cyber Hygiène des grandes entreprises

Comments
2 min read
How To Set Up Multi-Factor Authentication for SSH on Ubuntu?

How To Set Up Multi-Factor Authentication for SSH on Ubuntu?

Comments
3 min read
Uncovering the Weak Spots: A Guide to AI Security Vulnerabilities

Uncovering the Weak Spots: A Guide to AI Security Vulnerabilities

Comments
9 min read
Making sure your PDF compliance and privacy requirements are met with JoyDoc

Making sure your PDF compliance and privacy requirements are met with JoyDoc

6
Comments
12 min read
Building a Secure Fortress within AI: A Developer's Guide to Full-Stack Security 🏰

Building a Secure Fortress within AI: A Developer's Guide to Full-Stack Security 🏰

1
Comments 2
10 min read
🔒 The Future of Authentication Is Coming

🔒 The Future of Authentication Is Coming

1
Comments
1 min read
Outil de Cybersécurité du Jour - Aug 15, 2025

Outil de Cybersécurité du Jour - Aug 15, 2025

Comments
3 min read
Outil de Cybersécurité du Jour - Aug 15, 2025

Outil de Cybersécurité du Jour - Aug 15, 2025

Comments
2 min read
How to Secure Your Forgot Password Endpoint (Best Practices for Developers)

How to Secure Your Forgot Password Endpoint (Best Practices for Developers)

Comments
3 min read
How to decrypt broken GCM ciphertext

How to decrypt broken GCM ciphertext

1
Comments
4 min read
The End of .env Chaos: Introducing EnvShield

The End of .env Chaos: Introducing EnvShield

2
Comments
4 min read
A Reasonably Simple, Secure Password Scheme

A Reasonably Simple, Secure Password Scheme

Comments
8 min read
How to secure MCP servers with Vault + ToolHive in Kubernetes

How to secure MCP servers with Vault + ToolHive in Kubernetes

8
Comments
1 min read
🔐 Breaking Down Identity, Authentication, Authorization & SSO

🔐 Breaking Down Identity, Authentication, Authorization & SSO

1
Comments
3 min read
Designing mTLS for PostgreSQL: Getting SAN and Hostname Verification Right

Designing mTLS for PostgreSQL: Getting SAN and Hostname Verification Right

Comments
7 min read
loading...