DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 Secure Development Lifecycle (SDL) Explained: Building Secure Software by Design

🔐 Secure Development Lifecycle (SDL) Explained: Building Secure Software by Design

Comments
5 min read
🔍 Software Composition Analysis (SCA)

🔍 Software Composition Analysis (SCA)

Comments
2 min read
When Agents Attack: The Security Nightmare of Self Discovering APIs

When Agents Attack: The Security Nightmare of Self Discovering APIs

10
Comments 2
3 min read
Rate Limiting Access Codes: The Delicate Balance Between Security and UX

Rate Limiting Access Codes: The Delicate Balance Between Security and UX

1
Comments
2 min read
🔐 Observability Through Security Assessment

🔐 Observability Through Security Assessment

Comments
2 min read
Why Modern AppSec Needs Location-Aware Security Testing

Why Modern AppSec Needs Location-Aware Security Testing

Comments
4 min read
How Piracy and Cheating Kill Revenue for Indie Games

How Piracy and Cheating Kill Revenue for Indie Games

1
Comments
5 min read
CORS: The Traffic Guard You Actually Need (And How It Protects User Sessions)

CORS: The Traffic Guard You Actually Need (And How It Protects User Sessions)

5
Comments 1
3 min read
How to Configure Asymmetric JWTs on Self-Hosted Supabase

How to Configure Asymmetric JWTs on Self-Hosted Supabase

1
Comments 1
3 min read
Mutating vs Validating Webhooks in Kubernetes

Mutating vs Validating Webhooks in Kubernetes

2
Comments
3 min read
Auditly - Enterprise Python Dependency Vulnerability Scanner

Auditly - Enterprise Python Dependency Vulnerability Scanner

Comments
3 min read
Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Comments
7 min read
Secure MCP Development with Python and Gemini CLI

Secure MCP Development with Python and Gemini CLI

9
Comments
7 min read
Segurança de Banco de Dados na visão Blue Team: Muito além do comando GRANT

Segurança de Banco de Dados na visão Blue Team: Muito além do comando GRANT

5
Comments 2
6 min read
The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

1
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.