DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
ATLSECCON 2026: Context, Identity, and Restraint in Modern Security

ATLSECCON 2026: Context, Identity, and Restraint in Modern Security

Comments
8 min read
How to Create Safe External Redirects in WordPress

How to Create Safe External Redirects in WordPress

Comments
4 min read
How VLESS Reality Made VPNs Unblockable by Pretending to Be Google

How VLESS Reality Made VPNs Unblockable by Pretending to Be Google

Comments
5 min read
Best Secure Integration Platforms for Enterprise AI Agents: AI Agent Orchestration, Enterprise Security, IAM, and Platform Comparison

Best Secure Integration Platforms for Enterprise AI Agents: AI Agent Orchestration, Enterprise Security, IAM, and Platform Comparison

Comments
9 min read
U.S. Cyber Trust Mark: what IoT firmware teams should prepare

U.S. Cyber Trust Mark: what IoT firmware teams should prepare

2
Comments
2 min read
Can You Prove What Your AI Agent Did? Probably Not.

Can You Prove What Your AI Agent Did? Probably Not.

Comments
5 min read
Classical vs Quantum-Safe Encryption Compared

Classical vs Quantum-Safe Encryption Compared

Comments
9 min read
Supply Chain Attacks: When Your Privacy Tool Gets Compromised

Supply Chain Attacks: When Your Privacy Tool Gets Compromised

Comments
4 min read
Why We Open-Sourced Our AI Safety Layer

Why We Open-Sourced Our AI Safety Layer

Comments
4 min read
An IETF profile for AI agent compliance receipts

An IETF profile for AI agent compliance receipts

Comments
2 min read
I Built a Zero-Knowledge Encrypted Messenger That Runs Entirely in Your Browser — No Account, No Phone, No Install

I Built a Zero-Knowledge Encrypted Messenger That Runs Entirely in Your Browser — No Account, No Phone, No Install

Comments
5 min read
Linux 'Copy Fail' Exploit, Acoustic Keystroke Recovery, & New Lateral Movement

Linux 'Copy Fail' Exploit, Acoustic Keystroke Recovery, & New Lateral Movement

Comments
3 min read
A superscript-1 walks past every Go SSRF guard

A superscript-1 walks past every Go SSRF guard

Comments
12 min read
Adding a Trust Boundary to a Haystack Pipeline

Adding a Trust Boundary to a Haystack Pipeline

5
Comments
10 min read
Why I Built an Offline Metadata Shredder That Doesn't Just Delete — It Lies

Why I Built an Offline Metadata Shredder That Doesn't Just Delete — It Lies

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.