DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
why i chose to build nyami instead of just using pyarmor

why i chose to build nyami instead of just using pyarmor

1
Comments
3 min read
How I Got Enterprise-Grade DAST for Free in GitHub Actions (And Why Vanilla ZAP Finds 0 API Endpoints)

How I Got Enterprise-Grade DAST for Free in GitHub Actions (And Why Vanilla ZAP Finds 0 API Endpoints)

Comments
8 min read
What Changes and What Stays the Same for SRE with AWS Frontier Agents

What Changes and What Stays the Same for SRE with AWS Frontier Agents

2
Comments
12 min read
Everything Was Working: The Hidden Cloud Mistake That Exposed My Database and Taught Me Why VNets Matter

Everything Was Working: The Hidden Cloud Mistake That Exposed My Database and Taught Me Why VNets Matter

1
Comments
2 min read
Why I built Akmon, the AI coding agent for regulated engineering

Why I built Akmon, the AI coding agent for regulated engineering

Comments
6 min read
AGEF explained: a portable evidence format for AI agent sessions

AGEF explained: a portable evidence format for AI agent sessions

Comments
7 min read
AWS cloud security: the complete guide for 2026 (IAM, VPC, KMS, GuardDuty)

AWS cloud security: the complete guide for 2026 (IAM, VPC, KMS, GuardDuty)

Comments
8 min read
How I added cryptographic audit trails to any CrewAI crew in 3 lines

How I added cryptographic audit trails to any CrewAI crew in 3 lines

Comments
3 min read
Building a Voice-Controlled Local AI Agent with Human-in-the-Loop Execution

Building a Voice-Controlled Local AI Agent with Human-in-the-Loop Execution

Comments
4 min read
(The Senses) Image Generation & Media

(The Senses) Image Generation & Media

1
Comments
4 min read
Your Pen Test Takes 6 Weeks. Attackers Take 4 Minutes

Your Pen Test Takes 6 Weeks. Attackers Take 4 Minutes

2
Comments
6 min read
Your WordPress site can be fully compromised in 7 minutes. Here's what the attacker does with each one.

Your WordPress site can be fully compromised in 7 minutes. Here's what the attacker does with each one.

Comments
1 min read
Building a PCI-DSS Compliant DevSecOps CI/CD Pipeline for a Fintech Using .NET

Building a PCI-DSS Compliant DevSecOps CI/CD Pipeline for a Fintech Using .NET

Comments
8 min read
Warmed Permission Cache: Speed, Security, and the Real Trade-Offs

Warmed Permission Cache: Speed, Security, and the Real Trade-Offs

Comments
2 min read
Security Bite: Your Document Processor Is a Prompt Injection Channel — Here's the Fix

Security Bite: Your Document Processor Is a Prompt Injection Channel — Here's the Fix

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.