DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Error Unions in Zig: Safe and Explicit Error Handling

Understanding Error Unions in Zig: Safe and Explicit Error Handling

4
Comments 2
2 min read
HermitAI: Fine-Grained AI Access Control, API-First Auth & Permissions with Permit.io, Astro & Gemini

HermitAI: Fine-Grained AI Access Control, API-First Auth & Permissions with Permit.io, Astro & Gemini

14
Comments
8 min read
PermiShout: Recreating Twitter with Access Control using Permit.io

PermiShout: Recreating Twitter with Access Control using Permit.io

27
Comments 3
15 min read
BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs

BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs

Comments
7 min read
AutoGate — AI Permission Control for CMS | Permit.io Authorization Challenge

AutoGate — AI Permission Control for CMS | Permit.io Authorization Challenge

14
Comments
2 min read
Is GitHub Sponsors Safe? A Comprehensive Guide to Secure Open Source Funding

Is GitHub Sponsors Safe? A Comprehensive Guide to Secure Open Source Funding

Comments
7 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
Dynamic Access for Federated Learning System

Dynamic Access for Federated Learning System

11
Comments
1 min read
Notes on building a SCIM endpoint from scratch

Notes on building a SCIM endpoint from scratch

1
Comments
6 min read
5 Cloud Migration Trends You Should Know in 2025

5 Cloud Migration Trends You Should Know in 2025

Comments
2 min read
AutoSecure API Gateway: API-First Authorization Reimagined

AutoSecure API Gateway: API-First Authorization Reimagined

12
Comments
3 min read
Why I Ditched Apple Remote Desktop: A DevOps Engineer's Journey to Smarter Mac Management

Why I Ditched Apple Remote Desktop: A DevOps Engineer's Journey to Smarter Mac Management

Comments
2 min read
Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them

Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them

5
Comments 2
1 min read
From Kitchen to Code: Managing Restaurants with Permit.io Access Control

From Kitchen to Code: Managing Restaurants with Permit.io Access Control

17
Comments
2 min read
Preventing Pointer Misuse in C++ via Compile-Time Sandboxing (Inspired by Gene Logic)

Preventing Pointer Misuse in C++ via Compile-Time Sandboxing (Inspired by Gene Logic)

Comments
1 min read
An Introduction to API Security Automation

An Introduction to API Security Automation

Comments
10 min read
Expired SSL Certificate? Understand the Impact and Renewal Steps

Expired SSL Certificate? Understand the Impact and Renewal Steps

1
Comments 1
4 min read
How to verify your cookie consent is working 🍪🍪

How to verify your cookie consent is working 🍪🍪

3
Comments
1 min read
For those about to Bedrock…

For those about to Bedrock…

Comments 1
6 min read
Incident Response in AWS + Free PDF Playbook

Incident Response in AWS + Free PDF Playbook

Comments
1 min read
OpsGaurd - A Smart Access AI-Driven Tenant-Safe.

OpsGaurd - A Smart Access AI-Driven Tenant-Safe.

10
Comments
3 min read
Permit IO Challenge Entry: Tool Access Panel

Permit IO Challenge Entry: Tool Access Panel

10
Comments
7 min read
The Role of APP_KEY in Laravel and Why Key Rotation in Laravel 11 Is a Game Changer

The Role of APP_KEY in Laravel and Why Key Rotation in Laravel 11 Is a Game Changer

1
Comments
1 min read
DockerSensei - The Disciplined Approach to Container Security and Access

DockerSensei - The Disciplined Approach to Container Security and Access

40
Comments 1
5 min read
Real-time Collaboration Platform with Contextual Permissions

Real-time Collaboration Platform with Contextual Permissions

8
Comments
1 min read
loading...