DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Your Honeypot Catches Humans (Not Bots)

Why Your Honeypot Catches Humans (Not Bots)

1
Comments
3 min read
Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks

Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks

Comments
5 min read
Cyber Threats the Gaming Industry Faced in 2025, And What Indie Game Developers Can Learn

Cyber Threats the Gaming Industry Faced in 2025, And What Indie Game Developers Can Learn

Comments
4 min read
How to implement GHASH

How to implement GHASH

Comments
9 min read
Why Do Rotating Proxies for Web Scraping Work Locally but Fail When Deployed on Hosted Servers?

Why Do Rotating Proxies for Web Scraping Work Locally but Fail When Deployed on Hosted Servers?

Comments 2
12 min read
InfraForge v1.0.0 Launch

InfraForge v1.0.0 Launch

Comments
2 min read
CSRF in the Modern Era: Do you actually need tokens in a decoupled React/Node app?

CSRF in the Modern Era: Do you actually need tokens in a decoupled React/Node app?

Comments
3 min read
I built a Python tool to hunt down Remote Access Trojans on Windows

I built a Python tool to hunt down Remote Access Trojans on Windows

Comments
1 min read
🔒 Building a Secure AWS Environment with Terraform + AWS CloudShell

🔒 Building a Secure AWS Environment with Terraform + AWS CloudShell

1
Comments
6 min read
AI Systems That Can’t Say “No” Are Not Production-Ready

AI Systems That Can’t Say “No” Are Not Production-Ready

Comments
2 min read
Wearable Data Security: Protect User Privacy by Building a Secure Health Data Pipeline

Wearable Data Security: Protect User Privacy by Building a Secure Health Data Pipeline

Comments
2 min read
🛡️ Building a Cloud Security Dashboard with AWS Athena + QuickSight (Beginner Friendly)

🛡️ Building a Cloud Security Dashboard with AWS Athena + QuickSight (Beginner Friendly)

Comments
8 min read
The Silent Leak: Why Sensitive Data Masking is Your Most Critical Log Strategy

The Silent Leak: Why Sensitive Data Masking is Your Most Critical Log Strategy

Comments
3 min read
Building a Secure CI/CD Pipeline: Or How I Learned to Stop Worrying and Love DevSecOps

Building a Secure CI/CD Pipeline: Or How I Learned to Stop Worrying and Love DevSecOps

Comments
9 min read
Project: SSH & Server Security

Project: SSH & Server Security

1
Comments
4 min read
The Virtual Private Clouds (VPCs) is No Longer a Castle. It’s an Immune System.

The Virtual Private Clouds (VPCs) is No Longer a Castle. It’s an Immune System.

5
Comments
4 min read
🌐 Strengthening the Security Pillar of the AWS Well-Architected Framework: Introducing EC2 Instance Attestation

🌐 Strengthening the Security Pillar of the AWS Well-Architected Framework: Introducing EC2 Instance Attestation

Comments
2 min read
“Harvest Now, Decrypt Later” Is Already in Production

“Harvest Now, Decrypt Later” Is Already in Production

Comments
2 min read
The 100:1 Deficit: Why Your Security Team Needs an AI Multiplier

The 100:1 Deficit: Why Your Security Team Needs an AI Multiplier

Comments
5 min read
EP 11: Think Like a Hacker

EP 11: Think Like a Hacker

Comments
3 min read
Essential Security Practices for Securing Your Node.js Application

Essential Security Practices for Securing Your Node.js Application

1
Comments
1 min read
Docker Just Made Hardened Images Free for Everyone – Let's Check Them Out!

Docker Just Made Hardened Images Free for Everyone – Let's Check Them Out!

Comments
3 min read
My Perspective on Amazon Inspector's 2025 Updates for DevSecOps

My Perspective on Amazon Inspector's 2025 Updates for DevSecOps

Comments
4 min read
Security Challenges & Best Practices for Industrial Edge Analytics

Security Challenges & Best Practices for Industrial Edge Analytics

Comments
7 min read
Binary Sovereignty: Stop Uploading Your Unreleased App to Strangers

Binary Sovereignty: Stop Uploading Your Unreleased App to Strangers

Comments
6 min read
loading...