DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Solving Git Authentication Failures: "Password authentication is not supported" Error

Solving Git Authentication Failures: "Password authentication is not supported" Error

1
Comments
3 min read
How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

Comments
5 min read
Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

1
Comments
4 min read
Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Comments
3 min read
YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

4
Comments
6 min read
The Silent Threat: Visually Triggered AI Hijacking

The Silent Threat: Visually Triggered AI Hijacking

Comments
2 min read
Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Comments
6 min read
NDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025

NDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025

Comments
1 min read
Zero-Trust with IAM and SCPs: A Practical Guide for Cloud Engineers

Zero-Trust with IAM and SCPs: A Practical Guide for Cloud Engineers

Comments
2 min read
I Built an Offline Git Secrets Scanner. No Cloud, No Telemetry, Just Speed

I Built an Offline Git Secrets Scanner. No Cloud, No Telemetry, Just Speed

Comments
2 min read
Cloud Security: Concepts, Best Practices, Challenges, and the Role of AI

Cloud Security: Concepts, Best Practices, Challenges, and the Role of AI

Comments
5 min read
Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus

Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus

1
Comments
13 min read
Mastering Role-Based Access Control in Your Javascript CMS

Mastering Role-Based Access Control in Your Javascript CMS

Comments
6 min read
Feeling the Vibes with Verifi

Feeling the Vibes with Verifi

Comments
3 min read
Building a Production-Ready Enterprise AI Assistant with RAG and Security Guardrails

Building a Production-Ready Enterprise AI Assistant with RAG and Security Guardrails

Comments
10 min read
NPMScan - keep your NPM packages secure

NPMScan - keep your NPM packages secure

Comments
1 min read
AWS VPC: Security and Control from Scratch

AWS VPC: Security and Control from Scratch

Comments
4 min read
Hashicorp Vault for secrets management

Hashicorp Vault for secrets management

1
Comments
3 min read
Kubernetes Governance and Policy (OPA, Gatekeeper)

Kubernetes Governance and Policy (OPA, Gatekeeper)

Comments
4 min read
Building an Open Vulnerability Database for Minecraft Servers

Building an Open Vulnerability Database for Minecraft Servers

1
Comments
1 min read
Federated avatars in authentik

Federated avatars in authentik

Comments 2
4 min read
Secure DevSecOps Pipelines

Secure DevSecOps Pipelines

Comments
5 min read
One Line of Code to Secure Your AI Agents *(and Your Shadow MCP Servers)

One Line of Code to Secure Your AI Agents *(and Your Shadow MCP Servers)

Comments
6 min read
LLM Guardrails: 50+ Safety Layers Every AI Application Needs

LLM Guardrails: 50+ Safety Layers Every AI Application Needs

1
Comments
6 min read
6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms

6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms

Comments
8 min read
loading...