DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
ENABLE EBS ENCRYPTION BY DEFAULT IN 30 SECONDS

ENABLE EBS ENCRYPTION BY DEFAULT IN 30 SECONDS

1
Comments
3 min read
Architecting Resilient Caching in Symfony: Beyond get() and set()

Architecting Resilient Caching in Symfony: Beyond get() and set()

Comments
8 min read
Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Comments
1 min read
Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Comments
2 min read
Why the MITRE ATT&CK Framework Actually Works

Why the MITRE ATT&CK Framework Actually Works

Comments
6 min read
Validate JSON Using PHP

Validate JSON Using PHP

Comments
2 min read
The Poetic Hack: Exploiting LLMs with Verse by Arvind Sundararajan

The Poetic Hack: Exploiting LLMs with Verse by Arvind Sundararajan

Comments
2 min read
TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

Comments
4 min read
Secure Agent Database Access: Architecture Patterns That Actually Work

Secure Agent Database Access: Architecture Patterns That Actually Work

Comments
15 min read
Data Protection in Blockchain | CCPA Compliance

Data Protection in Blockchain | CCPA Compliance

2
Comments
3 min read
🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

Comments
1 min read
REMI Superada: evolución tras el Agentic Postgres Challenge

REMI Superada: evolución tras el Agentic Postgres Challenge

Comments 2
1 min read
Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Comments
5 min read
ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

Comments
12 min read
DOKUMEN STANDAR: Laravel Safe Email System

DOKUMEN STANDAR: Laravel Safe Email System

Comments 1
4 min read
Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

1
Comments
6 min read
Top 5 Container Security Books in 2026

Top 5 Container Security Books in 2026

Comments
3 min read
I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How

I Built Production-Ready 2FA (TOTP) in Node.js + Angular - Here's How

Comments
10 min read
Django data protection engine: encrypted fields, GDPR-style soft delete and audit log

Django data protection engine: encrypted fields, GDPR-style soft delete and audit log

Comments
3 min read
Using Amp (AI) For Static Code Analysis

Using Amp (AI) For Static Code Analysis

Comments
4 min read
Emergency Server Recovery: A 4-Hour Race Against Time

Emergency Server Recovery: A 4-Hour Race Against Time

Comments
4 min read
Understanding Content Security Policy (CSP)

Understanding Content Security Policy (CSP)

Comments
9 min read
🧱 Lesson 8 - Authentication & Authorization in .NET

🧱 Lesson 8 - Authentication & Authorization in .NET

3
Comments
7 min read
AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

3
Comments
2 min read
Image Scanning Tools (Anchore, Clair)

Image Scanning Tools (Anchore, Clair)

Comments
6 min read
loading...