DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Your Google Workspace: Preventing Admin Access Hostage Situations and Protecting Google Drive Data Usage

Securing Your Google Workspace: Preventing Admin Access Hostage Situations and Protecting Google Drive Data Usage

Comments
5 min read
The New Cost of Trust: Why Supply Chains and Identity Now Decide Whether Your Product Survives

The New Cost of Trust: Why Supply Chains and Identity Now Decide Whether Your Product Survives

Comments
5 min read
Email Authentication That Holds Up in the Real World (SPF, DKIM, DMARC — and the messy parts)

Email Authentication That Holds Up in the Real World (SPF, DKIM, DMARC — and the messy parts)

Comments
6 min read
I Gave My AI Agent a Brain. Then I Had to Protect It.

I Gave My AI Agent a Brain. Then I Had to Protect It.

Comments
5 min read
Linux Fundamentals - Part 13: File Permissions & Ownership

Linux Fundamentals - Part 13: File Permissions & Ownership

Comments
2 min read
Browser automation safety for SetupClaw: what to automate, what to keep manual, and how to handle credentials

Browser automation safety for SetupClaw: what to automate, what to keep manual, and how to handle credentials

Comments
4 min read
How a Small Config Change Can Silently Break Production (And How to Prevent It Automatically)

How a Small Config Change Can Silently Break Production (And How to Prevent It Automatically)

1
Comments
2 min read
SVG files are everywhere — icons, logos, illustrations, UI graphics...

SVG files are everywhere — icons, logos, illustrations, UI graphics...

Comments
2 min read
What Open Source Maintainers Miss in Large PRs (And How to Catch It)

What Open Source Maintainers Miss in Large PRs (And How to Catch It)

Comments
4 min read
Best Snyk Alternatives in 2026: Open-Source Dependency Security Tools

Best Snyk Alternatives in 2026: Open-Source Dependency Security Tools

Comments
2 min read
Why Permission Boundary Didn’t Restrict AmazonEC2FullAccess — Complete AWS IAM Debugging Guide

Why Permission Boundary Didn’t Restrict AmazonEC2FullAccess — Complete AWS IAM Debugging Guide

1
Comments
3 min read
The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

Comments
3 min read
Wallet-Based Identity for APIs: No More API Key Management

Wallet-Based Identity for APIs: No More API Key Management

Comments
1 min read
Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Comments
5 min read
Intentional Exercise Hacker 101 CTF writeup

Intentional Exercise Hacker 101 CTF writeup

Comments
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.