DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Audio's New Frontier: Balancing Creation and Copyright in the AI Age by Arvind Sundararajan

Audio's New Frontier: Balancing Creation and Copyright in the AI Age by Arvind Sundararajan

Comments
2 min read
Getting Started with eslint-plugin-secure-coding

Getting Started with eslint-plugin-secure-coding

Comments
3 min read
The Passkey Revolution: Why 2025 Is the Year Passwords Finally Die

The Passkey Revolution: Why 2025 Is the Year Passwords Finally Die

1
Comments
2 min read
What Is SIEM? Understanding Its Role in the Modern Cybersecurity Ecosystem

What Is SIEM? Understanding Its Role in the Modern Cybersecurity Ecosystem

Comments
3 min read
ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

Comments
5 min read
Hardware-backed SSH authentication with YubiKey (FIDO2)

Hardware-backed SSH authentication with YubiKey (FIDO2)

Comments 3
3 min read
The Art Of System Awareness: Reading Signals With Code

The Art Of System Awareness: Reading Signals With Code

Comments
8 min read
Excessive Agency in Agentic AI: Setting Safe Boundaries

Excessive Agency in Agentic AI: Setting Safe Boundaries

Comments
9 min read
Security news weekly round-up - 28th November 2025

Security news weekly round-up - 28th November 2025

1
Comments
3 min read
70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

Comments
1 min read
Limiting Public Access and Protecting Sensitive Data in Azure Storage

Limiting Public Access and Protecting Sensitive Data in Azure Storage

Comments
3 min read
Modernizing Telecom Security ML Powered Approach

Modernizing Telecom Security ML Powered Approach

Comments
5 min read
Environment Variables Without the Chaos: A Vault-First Approach

Environment Variables Without the Chaos: A Vault-First Approach

Comments
13 min read
Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

2
Comments
4 min read
The Security Engineer Interview Cheat Sheet for JavaScript Developers

The Security Engineer Interview Cheat Sheet for JavaScript Developers

Comments
3 min read
3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)

3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)

Comments
2 min read
Hardcoded Secrets: The #1 Vulnerability AI Agents Can Auto-Fix

Hardcoded Secrets: The #1 Vulnerability AI Agents Can Auto-Fix

Comments
2 min read
48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

Comments
1 min read
Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Comments
2 min read
Using IAM Users in 2026 Is a Life Choice

Using IAM Users in 2026 Is a Life Choice

3
Comments 3
3 min read
Build Your Own AIDE Automation - Guide

Build Your Own AIDE Automation - Guide

1
Comments
3 min read
Prompt Injection Attacks: The Hidden Security Threat in AI Applications

Prompt Injection Attacks: The Hidden Security Threat in AI Applications

1
Comments
14 min read
AWS Security Fundamentals with AWS BuilderCards Security Expansion Pack

AWS Security Fundamentals with AWS BuilderCards Security Expansion Pack

Comments
10 min read
Encrypting Secrets in Production (Without Breaking Everything)

Encrypting Secrets in Production (Without Breaking Everything)

Comments
4 min read
loading...