DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Coding Practices in Python

Secure Coding Practices in Python

Comments
1 min read
How to prevent DNS Spoofing in AWS.

How to prevent DNS Spoofing in AWS.

Comments
6 min read
How to integrate Docker Scout with Azure Container Registry

How to integrate Docker Scout with Azure Container Registry

Comments
4 min read
Hacking My Way Into Cybersecurity — The Beginning of My Journey!
Cover image for Hacking My Way Into Cybersecurity — The Beginning of My Journey!

Hacking My Way Into Cybersecurity — The Beginning of My Journey!

1
Comments
2 min read
Effortless Wazuh v4.10.0 upgrade using Docker

Effortless Wazuh v4.10.0 upgrade using Docker

Comments
2 min read
My First Nuget Package -Aadhaar Offline KYC Verification in .NET

My First Nuget Package -Aadhaar Offline KYC Verification in .NET

2
Comments 1
1 min read
Empowering Developers to Achieve Microservices Observability on Kubernetes with Tracestore, OPA, Flagger & Custom Metrics
Cover image for Empowering Developers to Achieve Microservices Observability on Kubernetes with Tracestore, OPA, Flagger & Custom Metrics

Empowering Developers to Achieve Microservices Observability on Kubernetes with Tracestore, OPA, Flagger & Custom Metrics

240
Comments 51
19 min read
The First Step to Quantum-Proofing Digital Security

The First Step to Quantum-Proofing Digital Security

Comments
2 min read
How Web3 Decentralized Identity Solutions are Transforming Online Security

How Web3 Decentralized Identity Solutions are Transforming Online Security

1
Comments 1
8 min read
Building a Strong Cybersecurity Foundation: Essential Practices
Cover image for Building a Strong Cybersecurity Foundation: Essential Practices

Building a Strong Cybersecurity Foundation: Essential Practices

1
Comments
2 min read
Java Security Practices

Java Security Practices

Comments
3 min read
Passwordless: A Password-Free Future, But What Are the Differences?
Cover image for Passwordless: A Password-Free Future, But What Are the Differences?

Passwordless: A Password-Free Future, But What Are the Differences?

2
Comments
4 min read
Navigating AWS Anti-Patterns: Common Pitfalls and Strategies to Avoid Them
Cover image for Navigating AWS Anti-Patterns: Common Pitfalls and Strategies to Avoid Them

Navigating AWS Anti-Patterns: Common Pitfalls and Strategies to Avoid Them

6
Comments
8 min read
AWS GuardDuty vs. Inspector vs. Shield, What’s the Difference?
Cover image for AWS GuardDuty vs. Inspector vs. Shield, What’s the Difference?

AWS GuardDuty vs. Inspector vs. Shield, What’s the Difference?

2
Comments
3 min read
Cybersecurity for Beginners: How to Secure Your Website from Hackers

Cybersecurity for Beginners: How to Secure Your Website from Hackers

1
Comments
2 min read
Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score
Cover image for Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score

Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score

Comments
10 min read
Join us for the Permit.io Authorization Challenge: $3,000 in Prizes and a Mechanical Keyboard for Each Winner 🤩
Cover image for Join us for the Permit.io Authorization Challenge: $3,000 in Prizes and a Mechanical Keyboard for Each Winner 🤩

Join us for the Permit.io Authorization Challenge: $3,000 in Prizes and a Mechanical Keyboard for Each Winner 🤩

141
Comments 22
6 min read
HealthCare Sector

HealthCare Sector

Comments
1 min read
Staying Secure & Connected While Traveling
Cover image for Staying Secure & Connected While Traveling

Staying Secure & Connected While Traveling

Comments
1 min read
Top 8 API Management Trends in 2025

Top 8 API Management Trends in 2025

7
Comments
8 min read
Professional Cloud Security Engineer Certification exam preparation 2025
Cover image for Professional Cloud Security Engineer Certification exam preparation 2025

Professional Cloud Security Engineer Certification exam preparation 2025

2
Comments 1
4 min read
Deploying Your Own AI on a Website in Just 15 Minutes? Yes, It’s Possible!

Deploying Your Own AI on a Website in Just 15 Minutes? Yes, It’s Possible!

Comments
1 min read
EthClipper: Exploiting Clipboard Vulnerabilities in Hardware wallet for Crypto Theft
Cover image for EthClipper: Exploiting Clipboard Vulnerabilities in Hardware wallet for Crypto Theft

EthClipper: Exploiting Clipboard Vulnerabilities in Hardware wallet for Crypto Theft

11
Comments
3 min read
Staking 2.0: How AI Optimizes Yield and Security
Cover image for Staking 2.0: How AI Optimizes Yield and Security

Staking 2.0: How AI Optimizes Yield and Security

Comments 1
1 min read
Guardius: Your DevOps and Security Companion
Cover image for Guardius: Your DevOps and Security Companion

Guardius: Your DevOps and Security Companion

Comments
3 min read
loading...