DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
API Webhook Security

API Webhook Security

Comments
2 min read
Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench
Cover image for Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

7
Comments
6 min read
I built this free tool so IT teams can customize and streamline their employee offboarding
Cover image for I built this free tool so IT teams can customize and streamline their employee offboarding

I built this free tool so IT teams can customize and streamline their employee offboarding

Comments
1 min read
Three sites that will make you a better developer
Cover image for Three sites that will make you a better developer

Three sites that will make you a better developer

Comments
1 min read
How to Transition from IT Support to Cybersecurity: A Complete Career Guide
Cover image for How to Transition from IT Support to Cybersecurity: A Complete Career Guide

How to Transition from IT Support to Cybersecurity: A Complete Career Guide

26
Comments 6
5 min read
Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI
Cover image for Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Comments
4 min read
Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide
Cover image for Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

1
Comments
3 min read
A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

Comments
4 min read
Security news weekly round-up - 28th February 2025
Cover image for Security news weekly round-up - 28th February 2025

Security news weekly round-up - 28th February 2025

Comments
2 min read
How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

10
Comments
4 min read
Best Practices for Storing and Securing Passwords: A Developer's Guide
Cover image for Best Practices for Storing and Securing Passwords: A Developer's Guide

Best Practices for Storing and Securing Passwords: A Developer's Guide

6
Comments
5 min read
Does Patching Containers Feel Like Whack-a-Mole?
Cover image for Does Patching Containers Feel Like Whack-a-Mole?

Does Patching Containers Feel Like Whack-a-Mole?

1
Comments
2 min read
⚡ Secure your containers faster—without disrupting your workflow
Cover image for ⚡ Secure your containers faster—without disrupting your workflow

⚡ Secure your containers faster—without disrupting your workflow

1
Comments
3 min read
Continuously patch GHCR images with Copacetic

Continuously patch GHCR images with Copacetic

1
Comments
3 min read
GDPR-Compliant Logging: A JavaScript Developer’s Checklist
Cover image for GDPR-Compliant Logging: A JavaScript Developer’s Checklist

GDPR-Compliant Logging: A JavaScript Developer’s Checklist

Comments
21 min read
BL-SOC01 - Jump Into SOC

BL-SOC01 - Jump Into SOC

3
Comments 1
5 min read
Non-Human Identity Security in the Age of AI
Cover image for Non-Human Identity Security in the Age of AI

Non-Human Identity Security in the Age of AI

Comments 1
7 min read
ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

Comments
2 min read
Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Comments
2 min read
Why your environment variables aren’t safe
Cover image for Why your environment variables aren’t safe

Why your environment variables aren’t safe

7
Comments 1
9 min read
The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards
Cover image for The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

Comments
4 min read
Meet BeanoGuard – Your New Best Friend for Secure Passwords

Meet BeanoGuard – Your New Best Friend for Secure Passwords

2
Comments
2 min read
Understanding the STRIDE Function in Cybersecurity
Cover image for Understanding the STRIDE Function in Cybersecurity

Understanding the STRIDE Function in Cybersecurity

Comments
3 min read
Using YubiKeys for passwordless authentication in Cognito user pools

Using YubiKeys for passwordless authentication in Cognito user pools

6
Comments
6 min read
AWS security and compliance

AWS security and compliance

Comments 1
1 min read
loading...