DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Top IDEs and Editors Used 👨🏻‍💻📝💡
Cover image for Top IDEs and Editors Used 👨🏻‍💻📝💡

Top IDEs and Editors Used 👨🏻‍💻📝💡

5
Comments
1 min read
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
Cover image for From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

Comments
12 min read
Automate Dynamic Application Security Testing (DAST) with CI/CD
Cover image for Automate Dynamic Application Security Testing (DAST) with CI/CD

Automate Dynamic Application Security Testing (DAST) with CI/CD

Comments
2 min read
Building a Strike System: How I Prevent AI Feature Abuse in My News App
Cover image for Building a Strike System: How I Prevent AI Feature Abuse in My News App

Building a Strike System: How I Prevent AI Feature Abuse in My News App

Comments
4 min read
Agentic AI Security: Why Autonomous Systems Require a New Security Framework
Cover image for Agentic AI Security: Why Autonomous Systems Require a New Security Framework

Agentic AI Security: Why Autonomous Systems Require a New Security Framework

38
Comments 12
5 min read
File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes
Cover image for File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

Comments
7 min read
Keeping Your Health Data Out of Court
Cover image for Keeping Your Health Data Out of Court

Keeping Your Health Data Out of Court

Comments
4 min read
Kubernetes validating admission policy and admission binding
Cover image for Kubernetes validating admission policy and admission binding

Kubernetes validating admission policy and admission binding

1
Comments
3 min read
FeetFinder & Background Checks: How Deep Do Employment Checks Go?

FeetFinder & Background Checks: How Deep Do Employment Checks Go?

Comments
4 min read
Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations
Cover image for Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

8
Comments 2
5 min read
Catch vulnerabilities before they ship: local SonarQube setup (Part 2)
Cover image for Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

1
Comments
8 min read
Building a Production-Ready A2A Protocol Agent: A Technical Journey

Building a Production-Ready A2A Protocol Agent: A Technical Journey

1
Comments
4 min read
Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks
Cover image for Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks

Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks

2
Comments
6 min read
😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫
Cover image for 😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

12
Comments 2
3 min read
How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

Comments
5 min read
Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

Comments
4 min read
Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It
Cover image for Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Comments
3 min read
From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days
Cover image for From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

15
Comments 2
4 min read
YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security
Cover image for YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

4
Comments
6 min read
10 Common Supabase Security Misconfigurations (and How to Fix Them)
Cover image for 10 Common Supabase Security Misconfigurations (and How to Fix Them)

10 Common Supabase Security Misconfigurations (and How to Fix Them)

1
Comments
6 min read
AWS re:Invent 2025: Updates in Infrastructure, Security, and Compute + Learning Path Summary
Cover image for AWS re:Invent 2025: Updates in Infrastructure, Security, and Compute + Learning Path Summary

AWS re:Invent 2025: Updates in Infrastructure, Security, and Compute + Learning Path Summary

6
Comments 1
5 min read
Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps
Cover image for Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Comments
6 min read
"If Your Health App Can't Explain Its Encryption, It Doesn't Have Any"
Cover image for "If Your Health App Can't Explain Its Encryption, It Doesn't Have Any"

"If Your Health App Can't Explain Its Encryption, It Doesn't Have Any"

Comments
7 min read
Why the F*ck Is Anyone Still Using FTP⁉️
Cover image for Why the F*ck Is Anyone Still Using FTP⁉️

Why the F*ck Is Anyone Still Using FTP⁉️

3
Comments
3 min read
NDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025

NDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025

Comments
1 min read
loading...