DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Securing Drupal Architectures at Scale: The 24-Hour SLA

Securing Drupal Architectures at Scale: The 24-Hour SLA

1
Comments
2 min read
Fragile Constraints: What Happens When AI Makes Rewriting Free

Fragile Constraints: What Happens When AI Makes Rewriting Free

1
Comments
7 min read
Using LLMs to do security analysis at the git diff level — what works, what doesn't, and why structured output matters

Using LLMs to do security analysis at the git diff level — what works, what doesn't, and why structured output matters

4
Comments
4 min read
Linxr | Part 2 — Shipping QEMU in an APK

Linxr | Part 2 — Shipping QEMU in an APK

1
Comments
3 min read
Bringing Your Own Data into Microsoft 365 Copilot (Without Breaking Security)

Bringing Your Own Data into Microsoft 365 Copilot (Without Breaking Security)

Comments
7 min read
RAG Security 101: Protecting Your Retrieval-Augmented Generation Pipeline

RAG Security 101: Protecting Your Retrieval-Augmented Generation Pipeline

1
Comments
4 min read
Running code quality pipelines during AI coding workflows

Running code quality pipelines during AI coding workflows

6
Comments
1 min read
Review: Cloudflare Endpoint-to-Prompt Data Security Guardrails for Drupal and WordPress AI Coding Workflows

Review: Cloudflare Endpoint-to-Prompt Data Security Guardrails for Drupal and WordPress AI Coding Workflows

Comments
3 min read
Two reports this week should worry anyone running AI agents

Two reports this week should worry anyone running AI agents

1
Comments
3 min read
5 Ways to Debug JWT Tokens (Without Losing Your Mind)

5 Ways to Debug JWT Tokens (Without Losing Your Mind)

Comments
3 min read
Why Supply Chain Security Fails in the Real World

Why Supply Chain Security Fails in the Real World

Comments
7 min read
The Agent That Went Rogue: What Happened and How I Fixed It

The Agent That Went Rogue: What Happened and How I Fixed It

Comments
4 min read
Designing Blockchain Systems: What Smart Contract Tutorials Don't Tell You (Part 1)

Designing Blockchain Systems: What Smart Contract Tutorials Don't Tell You (Part 1)

2
Comments
6 min read
TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

Comments
5 min read
Cost-Effective IAM Lab Infrastructure for Enterprise-Scale Testing

Cost-Effective IAM Lab Infrastructure for Enterprise-Scale Testing

1
Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.