DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Handling password-protected PDFs in Javascript

Handling password-protected PDFs in Javascript

1
Comments
6 min read
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Comments
5 min read
Secure Your Node.js API Like a Bank Vault

Secure Your Node.js API Like a Bank Vault

Comments
2 min read
Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Comments
1 min read
5-Layer Windows Registry Anomaly Detection Using Python

5-Layer Windows Registry Anomaly Detection Using Python

Comments
1 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set": style-src

Security - Solving the "Content Security Policy (CSP) Header Not Set": style-src

1
Comments
3 min read
Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Comments
2 min read
Why Developers Seek an Auth0 Alternative

Why Developers Seek an Auth0 Alternative

Comments
2 min read
AWS re:Inforce 2025 keynote highlights

AWS re:Inforce 2025 keynote highlights

5
Comments
9 min read
RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

Comments
10 min read
The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers

The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers

Comments 1
4 min read
Most Valuable When Least Visible | The Security Paradox

Most Valuable When Least Visible | The Security Paradox

Comments
3 min read
Face Recognition for Crypto: Enhancing Security and Trust

Face Recognition for Crypto: Enhancing Security and Trust

Comments
1 min read
Java Microservices on Kubernetes: A Step-by-Step Guide

Java Microservices on Kubernetes: A Step-by-Step Guide

Comments
1 min read
🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

5
Comments 2
3 min read
Mastering Kubernetes Security: A Practical Guide to Hardening Your Clusters

Mastering Kubernetes Security: A Practical Guide to Hardening Your Clusters

Comments
2 min read
Securing Modern Systems: Advanced Threat Modeling for Cloud-Native & AI

Securing Modern Systems: Advanced Threat Modeling for Cloud-Native & AI

1
Comments
8 min read
How to Effectively Vet Your Supply Chain for Optimal Performance

How to Effectively Vet Your Supply Chain for Optimal Performance

5
Comments
4 min read
Digital Twin of the Universe: The Deep Anatomy of Networks and the Rise of Cyber Consciousness

Digital Twin of the Universe: The Deep Anatomy of Networks and the Rise of Cyber Consciousness

4
Comments
3 min read
Private 5G: The Game-Changer for Industrial IoT and Smart Factories

Private 5G: The Game-Changer for Industrial IoT and Smart Factories

Comments
6 min read
Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Comments
2 min read
The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

Comments 1
4 min read
Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects

Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects

2
Comments
6 min read
K3S pods connected from external systems without any service load balancer configured

K3S pods connected from external systems without any service load balancer configured

Comments 1
1 min read
How to Buy the Right SSL Certificate Without Overspending

How to Buy the Right SSL Certificate Without Overspending

1
Comments 1
3 min read
loading...