DEV Community

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Securing Generative AI Applications: A Comprehensive Approach

Securing Generative AI Applications: A Comprehensive Approach

Comments
4 min read
Data Consistency and Integrity in API Integration

Data Consistency and Integrity in API Integration

2
Comments
5 min read
A Simple Instagram Tracking Script Written in Python

A Simple Instagram Tracking Script Written in Python

5
Comments
2 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
Protecting Sensitive Data using Ansible Vault

Protecting Sensitive Data using Ansible Vault

2
Comments
4 min read
๐“๐ก๐ž ๐๐ฌ๐ฒ๐œ๐ก๐จ๐ฅ๐จ๐ ๐ฒ ๐จ๐Ÿ ๐’๐จ๐œ๐ข๐š๐ฅ ๐„๐ง๐ ๐ข๐ง๐ž๐ž๐ซ๐ข๐ง๐ : ๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ๐ฌ๐ž๐ฅ๐Ÿ ๐š๐ง๐ ๐˜๐จ๐ฎ๐ซ ๐ƒ๐š๐ญ๐š

๐“๐ก๐ž ๐๐ฌ๐ฒ๐œ๐ก๐จ๐ฅ๐จ๐ ๐ฒ ๐จ๐Ÿ ๐’๐จ๐œ๐ข๐š๐ฅ ๐„๐ง๐ ๐ข๐ง๐ž๐ž๐ซ๐ข๐ง๐ : ๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ๐ฌ๐ž๐ฅ๐Ÿ ๐š๐ง๐ ๐˜๐จ๐ฎ๐ซ ๐ƒ๐š๐ญ๐š

5
Comments 7
1 min read
Safe and Secure Consumption of Open Source Libraries

Safe and Secure Consumption of Open Source Libraries

2
Comments
3 min read
What Technologies Help Prevent Cyber Attacks? ๐Ÿ›ก๏ธ๐Ÿ’ป

What Technologies Help Prevent Cyber Attacks? ๐Ÿ›ก๏ธ๐Ÿ’ป

2
Comments
1 min read
๐‚๐ซ๐ž๐š๐ญ๐ข๐ง๐  ๐š ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฌ๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐Ÿ๐จ๐ซ ๐ฒ๐จ๐ฎ๐ซ ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ: ๐ค๐ž๐ฒ ๐ฌ๐ญ๐š๐ ๐ž๐ฌ ๐š๐ง๐ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

๐‚๐ซ๐ž๐š๐ญ๐ข๐ง๐  ๐š ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฌ๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐Ÿ๐จ๐ซ ๐ฒ๐จ๐ฎ๐ซ ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ: ๐ค๐ž๐ฒ ๐ฌ๐ญ๐š๐ ๐ž๐ฌ ๐š๐ง๐ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

1
Comments
1 min read
How to Apply a Magento 2 Patch

How to Apply a Magento 2 Patch

5
Comments 2
2 min read
JWT for Developers: Behind the Scenes.

JWT for Developers: Behind the Scenes.

4
Comments 1
4 min read
SSRF Vulnerability in HiTranslate: A Technical Breakdown

SSRF Vulnerability in HiTranslate: A Technical Breakdown

Comments
2 min read
Patch your servers! It's time of regreSSHion

Patch your servers! It's time of regreSSHion

2
Comments
1 min read
How to Design Secure and Safe APIs: 12 Essential Tips for API Security

How to Design Secure and Safe APIs: 12 Essential Tips for API Security

2
Comments
3 min read
Level up your Git security: Verified commits with Kleopatra!

Level up your Git security: Verified commits with Kleopatra!

6
Comments
1 min read
๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.