DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
5 Tricks to Secure your Docker Images
Cover image for 5 Tricks to Secure your Docker Images

5 Tricks to Secure your Docker Images

19
Comments
3 min read
CORS Done Wrong? Say Hello to Security Risks!

CORS Done Wrong? Say Hello to Security Risks!

3
Comments 4
3 min read
Segurança em Aplicativos Móveis: Da Teoria à Prática em Sistemas Financeiros
Cover image for Segurança em Aplicativos Móveis: Da Teoria à Prática em Sistemas Financeiros

Segurança em Aplicativos Móveis: Da Teoria à Prática em Sistemas Financeiros

Comments
7 min read
Mobile Application Security: From Theory to Practice in Financial Systems
Cover image for Mobile Application Security: From Theory to Practice in Financial Systems

Mobile Application Security: From Theory to Practice in Financial Systems

1
Comments
6 min read
Understanding Antimalware Service Executable: Is It Safe to Disable?
Cover image for Understanding Antimalware Service Executable: Is It Safe to Disable?

Understanding Antimalware Service Executable: Is It Safe to Disable?

2
Comments 1
3 min read
Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System
Cover image for Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System

Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System

Comments
9 min read
Secure Your RESTful API Using Keycloak Role-Based Access Control
Cover image for Secure Your RESTful API Using Keycloak Role-Based Access Control

Secure Your RESTful API Using Keycloak Role-Based Access Control

12
Comments 2
8 min read
What is Port 22? SSH, Security Risks, & Best Practices
Cover image for What is Port 22? SSH, Security Risks, & Best Practices

What is Port 22? SSH, Security Risks, & Best Practices

Comments
5 min read
How to Create Secure and Scalable Web Applications with MERN
Cover image for How to Create Secure and Scalable Web Applications with MERN

How to Create Secure and Scalable Web Applications with MERN

Comments
3 min read
Introducing Zerodayf, A dynamic, AI-driven code analysis vulnerability scanner

Introducing Zerodayf, A dynamic, AI-driven code analysis vulnerability scanner

Comments
1 min read
Wireless Networks and Mobile Communication 📡📲
Cover image for Wireless Networks and Mobile Communication 📡📲

Wireless Networks and Mobile Communication 📡📲

Comments
3 min read
Cybersecurity Certifications: Your Guide to a Successful Career
Cover image for Cybersecurity Certifications: Your Guide to a Successful Career

Cybersecurity Certifications: Your Guide to a Successful Career

Comments
2 min read
Manual Cognito user registration approvals with Step Functions

Manual Cognito user registration approvals with Step Functions

9
Comments
10 min read
ACID in Databases: A Comprehensive Guide
Cover image for ACID in Databases: A Comprehensive Guide

ACID in Databases: A Comprehensive Guide

Comments
5 min read
2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

6
Comments
1 min read
Smart Contract Security
Cover image for Smart Contract Security

Smart Contract Security

Comments
3 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

Comments
1 min read
Gamification in Vaccination Centers – Does it Work?

Gamification in Vaccination Centers – Does it Work?

Comments
1 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
AWS Multi-Account IaC Sandwich: Terragrunt, Terraform, CloudFormation
Cover image for AWS Multi-Account IaC Sandwich: Terragrunt, Terraform, CloudFormation

AWS Multi-Account IaC Sandwich: Terragrunt, Terraform, CloudFormation

4
Comments 2
9 min read
Auditing SQL Server Database User Activity in AWS RDS: A Step-by-Step Guide
Cover image for Auditing SQL Server Database User Activity in AWS RDS: A Step-by-Step Guide

Auditing SQL Server Database User Activity in AWS RDS: A Step-by-Step Guide

2
Comments 1
3 min read
How to Build a Robust CI/CD Process for a Bank: A Practical Guide
Cover image for How to Build a Robust CI/CD Process for a Bank: A Practical Guide

How to Build a Robust CI/CD Process for a Bank: A Practical Guide

Comments
4 min read
Just published my first web service - Automated security scanning for webapps

Just published my first web service - Automated security scanning for webapps

Comments
1 min read
How to Integrate AI Solutions into Your Enterprise System for Maximum ROI
Cover image for How to Integrate AI Solutions into Your Enterprise System for Maximum ROI

How to Integrate AI Solutions into Your Enterprise System for Maximum ROI

Comments
4 min read
Shield Your Agents: Integrating LangGraph’s workflows with CodeGate's Security Layer
Cover image for Shield Your Agents: Integrating LangGraph’s workflows with CodeGate's Security Layer

Shield Your Agents: Integrating LangGraph’s workflows with CodeGate's Security Layer

11
Comments
5 min read
loading...