DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Your Honeypot Catches Humans (Not Bots)

Why Your Honeypot Catches Humans (Not Bots)

2
Comments
3 min read
Protecting Sensitive Data Using Envelope Encryption

Protecting Sensitive Data Using Envelope Encryption

Comments
6 min read
Rust Weekly Log: Tracing, Observability & Cryptographic Hashes

Rust Weekly Log: Tracing, Observability & Cryptographic Hashes

Comments
1 min read
Is Your AI Agent a Compliance Risk? How to Find Violations Hidden in Traces

Is Your AI Agent a Compliance Risk? How to Find Violations Hidden in Traces

Comments
2 min read
Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks

Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks

Comments
5 min read
Why Post-Hoc Moderation Fails in Real-Time Systems

Why Post-Hoc Moderation Fails in Real-Time Systems

Comments
4 min read
I automated data breach response - changing 50 passwords in 30 minutes instead of 8 hours

I automated data breach response - changing 50 passwords in 30 minutes instead of 8 hours

Comments
3 min read
Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging

Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging

Comments
3 min read
Improved Dependency Submission for GitHub Actions

Improved Dependency Submission for GitHub Actions

Comments
3 min read
How to Improve Checkout Experiences for More Sales

How to Improve Checkout Experiences for More Sales

Comments
3 min read
Decentralized Finance's Biggest Vulnerability: Why Private Key Management Can't Stay Private

Decentralized Finance's Biggest Vulnerability: Why Private Key Management Can't Stay Private

1
Comments 2
4 min read
The $3 Billion Loss Year: End-of-Year Security Report

The $3 Billion Loss Year: End-of-Year Security Report

1
Comments
4 min read
Understanding Browser Automation Detection: A Technical Deep Dive for Developers

Understanding Browser Automation Detection: A Technical Deep Dive for Developers

Comments
7 min read
How Rate Limiting Saved Me $500 in One Day (Real Story)

How Rate Limiting Saved Me $500 in One Day (Real Story)

Comments
2 min read
I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

Comments
6 min read
NodeJS 101 —  Part 4 🔐 Authorization with JWT

NodeJS 101 —  Part 4 🔐 Authorization with JWT

Comments
4 min read
I’m building a deterministic policy firewall for AI systems — looking for technical feedback

I’m building a deterministic policy firewall for AI systems — looking for technical feedback

Comments
1 min read
PEM vs. PKCS#12 (P12/PFX): Understanding the Difference Between Certificate Formats

PEM vs. PKCS#12 (P12/PFX): Understanding the Difference Between Certificate Formats

1
Comments
3 min read
I built a Python tool to hunt down Remote Access Trojans on Windows

I built a Python tool to hunt down Remote Access Trojans on Windows

Comments
1 min read
Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Comments
9 min read
Building a Secure CI/CD Pipeline: Or How I Learned to Stop Worrying and Love DevSecOps

Building a Secure CI/CD Pipeline: Or How I Learned to Stop Worrying and Love DevSecOps

Comments
9 min read
Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

6
Comments
4 min read
Is 'Shift Left' Just Another Buzzword? Rethinking Enterprise Security in 2026

Is 'Shift Left' Just Another Buzzword? Rethinking Enterprise Security in 2026

Comments
4 min read
The OWASP Top 10 for AI Agents: Your 2026 Security Checklist (ASI Top 10)

The OWASP Top 10 for AI Agents: Your 2026 Security Checklist (ASI Top 10)

5
Comments
5 min read
OSI Layer 4—The Steward

OSI Layer 4—The Steward

Comments
4 min read
loading...