DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Making Invalid States Unrepresentable: The Billion-Dollar Mistake That Wasn't

Making Invalid States Unrepresentable: The Billion-Dollar Mistake That Wasn't

2
Comments 1
11 min read
Building Tamper-Proof Audit Trails for AI Content Pipelines: A Practical Guide to CAP

Building Tamper-Proof Audit Trails for AI Content Pipelines: A Practical Guide to CAP

Comments
6 min read
Outil de Cybersécurité du Jour - Dec 28, 2025

Outil de Cybersécurité du Jour - Dec 28, 2025

Comments
3 min read
Minutes for Attackers, Weeks for Defenders: Reducing Attack Surface in AWS

Minutes for Attackers, Weeks for Defenders: Reducing Attack Surface in AWS

7
Comments 1
4 min read
Sovereign Cloud: Owning Your Keys in the Era of the CLOUD Act

Sovereign Cloud: Owning Your Keys in the Era of the CLOUD Act

9
Comments 2
3 min read
👤 AWS 116: Who Goes There? - Creating Your First IAM User

👤 AWS 116: Who Goes There? - Creating Your First IAM User

Comments
3 min read
33 Million Accounts Exposed: What the Condé Nast Breach Teaches Engineering Leaders

33 Million Accounts Exposed: What the Condé Nast Breach Teaches Engineering Leaders

Comments
5 min read
Building a Security Test Lab with QEMU: From Zero to Network Monitoring

Building a Security Test Lab with QEMU: From Zero to Network Monitoring

Comments
9 min read
Production-Ready NestJS Boilerplate for Scalable & Secure Backends 🚀

Production-Ready NestJS Boilerplate for Scalable & Secure Backends 🚀

Comments
3 min read
5 Security Mistakes I See All The Time

5 Security Mistakes I See All The Time

Comments
3 min read
Solana Vulnerabilities Every Developer Should Know

Solana Vulnerabilities Every Developer Should Know

Comments
20 min read
Docker Deep Dive: One Container, One Process

Docker Deep Dive: One Container, One Process

Comments
8 min read
(Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾

(Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾

1
Comments 1
3 min read
How to Quickly Diagnose Network Issues Using Browser-Based Tools

How to Quickly Diagnose Network Issues Using Browser-Based Tools

Comments
3 min read
Building a CMS-Level Firewall: Why Application Context Matters

Building a CMS-Level Firewall: Why Application Context Matters

Comments 1
10 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.