PinnedPublished inDevSecOps & AIWrite For UsDevSecOps & AI is a growing publication for anyone who ships software. Want to write for us? Read this article.May 9A response icon25May 9A response icon25
Published inLevel Up CodingSpring Data JPA Best Practices: Entity Design GuideQuintessence of pure experience: discover the best practices for designing entities with Spring Data JPA in this comprehensive guide.22h ago22h ago
Published inDevSecOps & AIFuture of this publication & Looking for ModeratorsCurrently, I don’t have a lot of time to manage this publication and promote it. New articles will be published with delays.Oct 11Oct 11
Published inLevel Up CodingDocker Best Practices to Secure and Optimize Your ContainersMaster Docker image building with 29 Docker Best Practices for performance and security.Sep 28Sep 28
Published inLevel Up CodingKubernetes Security: Best Practices to Protect Your ClusterLearn 12 Kubernetes security best practices for 2025. Prevent privilege escalation and container escapes, and secure your cluster…Sep 16Sep 16
Published inLevel Up CodingUsing SBOMs to detect possible Dependency ConfusionLearn how to leverage CycloneDX SBOMs and automated registry checks to detect and prevent dependency confusion attacks by identifying…Aug 22Aug 22
Published inLevel Up CodingRevival Hijacking: How Deleted PyPI Packages Become ThreatsYou can find the original version of this article on my website, protsenko.dev.Aug 4A response icon1Aug 4A response icon1
Published inDevSecOps & AICloud Security plugin for JetBrains IDEs | Dev Diary #2Almost a year passed before I began developing the plugin to improve the security of Infrastructure as Code files. Many rules were…Jun 20Jun 20
Published inDevSecOps & AIAI-assisted hacking with JetBrains Junie: Subdomain enumeration. Lessons I Learned.Turn JetBrains Junie into your hacking helper, optimize your AI usage, and code truly hacker-level Python scripts to collect subdomains.May 22May 22
Published inDevSecOps & AIDependency Confusion: Critical Security Risks of Using Internal RepositoriesA comprehensive, hands‑on guide to finding dependency‑confusion issues in private repositorie and fixing them before attackers exploit…May 7May 7