DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Developing Connected Smart Locks

Developing Connected Smart Locks

Comments
3 min read
AI Wargame at NDC Sydney & Black Hat Asia

AI Wargame at NDC Sydney & Black Hat Asia

Comments
1 min read
Zero-Trust Proximity: Automating Tunnel Kill-Switches via UWB

Zero-Trust Proximity: Automating Tunnel Kill-Switches via UWB

Comments
9 min read
Building a Loan Defaulter Risk Assessment Platform at Scale

Building a Loan Defaulter Risk Assessment Platform at Scale

Comments
8 min read
Static vs Semantic: how a security scanner reads AI-generated code

Static vs Semantic: how a security scanner reads AI-generated code

Comments
4 min read
Three agent frameworks, same missing piece

Three agent frameworks, same missing piece

Comments
3 min read
Goodbye localhost, hello AWS: adding security to your Java serveless app

Goodbye localhost, hello AWS: adding security to your Java serveless app

5
Comments
11 min read
Goodbye localhost, hello AWS: adding security to re:Money

Goodbye localhost, hello AWS: adding security to re:Money

Comments
11 min read
Your dependencies are 48% unmaintained — and SCA tools can't see it

Your dependencies are 48% unmaintained — and SCA tools can't see it

Comments
5 min read
Controlling AI Agent Outbound traffic at the Kernel Level(+14ms overhead)

Controlling AI Agent Outbound traffic at the Kernel Level(+14ms overhead)

Comments
3 min read
OpenAI and Anthropic Are Racing to Build AI Cyber Weapons. Neither Will Let You Use Them.

OpenAI and Anthropic Are Racing to Build AI Cyber Weapons. Neither Will Let You Use Them.

Comments
8 min read
340% and Climbing: What the CIS Prompt Injection Report Means for Enterprise AI Agents

340% and Climbing: What the CIS Prompt Injection Report Means for Enterprise AI Agents

Comments
10 min read
AI-Assisted Development Workflows: Code Review, Testing, and Documentation

AI-Assisted Development Workflows: Code Review, Testing, and Documentation

Comments
7 min read
Why Cursor Skips Auth Middleware on Every Route It Generates

Why Cursor Skips Auth Middleware on Every Route It Generates

Comments
3 min read
Building Runtime Enforcement for Kubernetes with eBPF

Building Runtime Enforcement for Kubernetes with eBPF

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.