DEV Community

丁久 profile picture

丁久

404 bio not found

Joined Joined on 
WAF Deployment Patterns

WAF Deployment Patterns

Comments
2 min read
Vulnerability Management

Vulnerability Management

Comments
1 min read
Threat Modeling

Threat Modeling

Comments
2 min read
Threat Intelligence Feeds

Threat Intelligence Feeds

Comments
2 min read
SSO Architecture

SSO Architecture

Comments
2 min read
Software Signing

Software Signing

Comments
2 min read
SOC 2 Technical Controls

SOC 2 Technical Controls

Comments
2 min read
Security Engineer Interview

Security Engineer Interview

Comments
2 min read
Security Awareness Training

Security Awareness Training

Comments
2 min read
Secure Code Review

Secure Code Review

Comments
1 min read
Secrets Rotation

Secrets Rotation

Comments
2 min read
SBOM Management

SBOM Management

Comments
2 min read
Passwordless Authentication

Passwordless Authentication

Comments
1 min read
OWASP Top 10 2026

OWASP Top 10 2026

Comments
2 min read
OAuth2 Implementation

OAuth2 Implementation

Comments
1 min read
MFA Implementation

MFA Implementation

Comments
2 min read
Kubernetes Security

Kubernetes Security

Comments
1 min read
Incident Response Plan

Incident Response Plan

Comments
1 min read
IAM Audit

IAM Audit

Comments
2 min read
Helm Security

Helm Security

Comments
1 min read
GDPR Technical Controls

GDPR Technical Controls

Comments
1 min read
Data Loss Prevention Strategies

Data Loss Prevention Strategies

Comments
2 min read
DDoS Mitigation

DDoS Mitigation

Comments
2 min read
Database Encryption

Database Encryption

Comments
1 min read
Data Classification

Data Classification

Comments
2 min read
Container Runtime Security

Container Runtime Security

Comments
1 min read
Compliance Automation

Compliance Automation

Comments
1 min read
Cloud Network Security

Cloud Network Security

Comments
1 min read
Web Application Firewall Implementation

Web Application Firewall Implementation

Comments
2 min read
TLS Configuration Guide

TLS Configuration Guide

Comments
2 min read
Threat Hunting

Threat Hunting

Comments
2 min read
Supply Chain Security

Supply Chain Security

Comments
2 min read
SOC Operations

SOC Operations

Comments
2 min read
Session Management Security

Session Management Security

Comments
2 min read
Serverless Security

Serverless Security

Comments
2 min read
Security Metrics and Reporting

Security Metrics and Reporting

Comments
2 min read
Secure Configuration Management

Secure Configuration Management

Comments
2 min read
Secure API Design Principles

Secure API Design Principles

Comments
2 min read
Privacy Engineering

Privacy Engineering

Comments
2 min read
Penetration Testing Methodology

Penetration Testing Methodology

Comments
1 min read
Patching Strategy

Patching Strategy

Comments
1 min read
Output Encoding

Output Encoding

Comments
2 min read
Microservice Security

Microservice Security

Comments
1 min read
Malware Analysis Fundamentals

Malware Analysis Fundamentals

Comments
2 min read
Kubernetes Network Policies

Kubernetes Network Policies

Comments
1 min read
Key Management Systems

Key Management Systems

Comments
1 min read
Input Validation Deep Dive

Input Validation Deep Dive

Comments
2 min read
Infrastructure as Code Security

Infrastructure as Code Security

Comments
2 min read
Digital Forensics Guide

Digital Forensics Guide

Comments
1 min read
Email Security

Email Security

Comments
2 min read
DNS Security

DNS Security

Comments
2 min read
Data Masking and Redaction

Data Masking and Redaction

Comments
2 min read
CORS Security

CORS Security

Comments
2 min read
Content Security Policy

Content Security Policy

Comments
2 min read
Building Custom AI Agents with LangGraph: A Practical Guide

Building Custom AI Agents with LangGraph: A Practical Guide

Comments
3 min read
AI Recommendation Systems: From Embeddings to Production

AI Recommendation Systems: From Embeddings to Production

Comments
3 min read
Container Image Security

Container Image Security

Comments
2 min read
Cloud Security Posture Management

Cloud Security Posture Management

Comments
2 min read
Cloud IAM Deep Dive

Cloud IAM Deep Dive

Comments
2 min read
Clickjacking Protection

Clickjacking Protection

Comments
2 min read
loading...