DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging

Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging

Comments
3 min read
How I Explain Ghidra Output With AI

How I Explain Ghidra Output With AI

3
Comments
4 min read
Improved Dependency Submission for GitHub Actions

Improved Dependency Submission for GitHub Actions

Comments
3 min read
What is JWT?

What is JWT?

7
Comments
1 min read
Zero Trust Isn’t About Firewalls — It’s About Identity

Zero Trust Isn’t About Firewalls — It’s About Identity

Comments
3 min read
How to Improve Checkout Experiences for More Sales

How to Improve Checkout Experiences for More Sales

Comments
3 min read
Decentralized Finance's Biggest Vulnerability: Why Private Key Management Can't Stay Private

Decentralized Finance's Biggest Vulnerability: Why Private Key Management Can't Stay Private

1
Comments 2
4 min read
The $3 Billion Loss Year: End-of-Year Security Report

The $3 Billion Loss Year: End-of-Year Security Report

1
Comments
4 min read
Decompiling the Scam: BTDUex's "AI Strategy" is Hardcoded Fraud

Decompiling the Scam: BTDUex's "AI Strategy" is Hardcoded Fraud

1
Comments 1
1 min read
API Key Security Best Practices for 2026

API Key Security Best Practices for 2026

Comments
3 min read
I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

Comments
6 min read
How Rate Limiting Saved Me $500 in One Day (Real Story)

How Rate Limiting Saved Me $500 in One Day (Real Story)

Comments
2 min read
I’m building a deterministic policy firewall for AI systems — looking for technical feedback

I’m building a deterministic policy firewall for AI systems — looking for technical feedback

Comments
1 min read
I built a Python tool to hunt down Remote Access Trojans on Windows

I built a Python tool to hunt down Remote Access Trojans on Windows

Comments
1 min read
Zero Trust 2026: Has the Trust Boundary 'Vanished'? AI, ID-JAG, and Confidential Computing

Zero Trust 2026: Has the Trust Boundary 'Vanished'? AI, ID-JAG, and Confidential Computing

1
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.