DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
When AI Decisions Drift Away From Human Accountability, Governance Fails

When AI Decisions Drift Away From Human Accountability, Governance Fails

Comments
1 min read
Cuando las decisiones de la IA se alejan de la responsabilidad humana, la gobernanza falla

Cuando las decisiones de la IA se alejan de la responsabilidad humana, la gobernanza falla

Comments
1 min read
OAuth Simplified: A Hands-On Breakdown

OAuth Simplified: A Hands-On Breakdown

Comments
6 min read
How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide

How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide

Comments
5 min read
Why I Built DDL to Data

Why I Built DDL to Data

Comments
4 min read
Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)

Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)

1
Comments
2 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
How I Run LLM Agents in a Secure Nix Sandbox

How I Run LLM Agents in a Secure Nix Sandbox

Comments
5 min read
Why Auth0 email_verified Was Missing from My Access Token (And How to Fix It)

Why Auth0 email_verified Was Missing from My Access Token (And How to Fix It)

Comments
3 min read
Why Does SOCKS5 Proxy Login Trigger Account Warnings or Failures When Switching Between Cloud and Local Access?

Why Does SOCKS5 Proxy Login Trigger Account Warnings or Failures When Switching Between Cloud and Local Access?

Comments
12 min read
Residential vs Dedicated Proxies: What "Dedicated" Means and How to Decide

Residential vs Dedicated Proxies: What "Dedicated" Means and How to Decide

Comments
15 min read
I built a Docker vulnerability scanner - Beta testers wanted!!!

I built a Docker vulnerability scanner - Beta testers wanted!!!

Comments
1 min read
Most Security Teams Can’t Scale Access Management Beyond 50 Employees - Here’s how to fix it

Most Security Teams Can’t Scale Access Management Beyond 50 Employees - Here’s how to fix it

Comments
6 min read
Application Layer: Where Software Meets the Network

Application Layer: Where Software Meets the Network

Comments
3 min read
Zero-Knowledge Security: Protecting Patient Privacy Through Client-Side Encryption

Zero-Knowledge Security: Protecting Patient Privacy Through Client-Side Encryption

Comments
3 min read
Did you know?

Did you know?

Comments
1 min read
Malicious Chrome Extensions Steal AI Chats: How to Protect Your Conversations in 2026

Malicious Chrome Extensions Steal AI Chats: How to Protect Your Conversations in 2026

1
Comments
4 min read
Designing Secure Plugin Architectures for Desktop Applications

Designing Secure Plugin Architectures for Desktop Applications

Comments
12 min read
Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)

Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)

3
Comments 1
4 min read
AiCybr: 60+ Privacy-Focused Tools in One Place

AiCybr: 60+ Privacy-Focused Tools in One Place

Comments
3 min read
Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.

Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.

Comments
1 min read
Protecting an EC2 hosted web application with AWS WAF in practice

Protecting an EC2 hosted web application with AWS WAF in practice

Comments
12 min read
Agent Security Explained By Dawn Song

Agent Security Explained By Dawn Song

Comments
3 min read
New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse

New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse

Comments 1
15 min read
The Modern Home Network Has No Safe Mode

The Modern Home Network Has No Safe Mode

2
Comments
5 min read
loading...