DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Exploring Claude's Quirks: Bugs, Laughs, and Transparency | Anthropic AI

Exploring Claude's Quirks: Bugs, Laughs, and Transparency | Anthropic AI

6
Comments
3 min read
Building a CLI for the Ecosyste.ms API

Building a CLI for the Ecosyste.ms API

Comments
3 min read
Fort Knox Federated Learning: Next-Gen Security Tactics

Fort Knox Federated Learning: Next-Gen Security Tactics

Comments
2 min read
Biometric fingerprint authentication on SmartCard Chips

Biometric fingerprint authentication on SmartCard Chips

Comments
3 min read
Hosting Private AI with Railway - Tech Breakdown

Hosting Private AI with Railway - Tech Breakdown

2
Comments
3 min read
The Largest NPM Supply Chain Attack Ever and How to Defend Against It

The Largest NPM Supply Chain Attack Ever and How to Defend Against It

Comments 1
5 min read
🍎 From UTXOs to SegWit: How Bitcoin Fixed Transaction Malleability and Lowered Fees

🍎 From UTXOs to SegWit: How Bitcoin Fixed Transaction Malleability and Lowered Fees

Comments
2 min read
Privileged: A Powerful Authorization Library for .NET

Privileged: A Powerful Authorization Library for .NET

Comments
4 min read
Why eFuses Matter in Firmware Security: Permanent Storage, Anti-Rollback, and Device Identity

Why eFuses Matter in Firmware Security: Permanent Storage, Anti-Rollback, and Device Identity

6
Comments
4 min read
Building HIPAA-Compliant Healthcare Apps: Best Practices

Building HIPAA-Compliant Healthcare Apps: Best Practices

Comments
5 min read
Securely Configuring Azure Blob Storage in .NET Web API

Securely Configuring Azure Blob Storage in .NET Web API

1
Comments
3 min read
🚀 Secure Your Flutter Apps Like a Pro! 🔐

🚀 Secure Your Flutter Apps Like a Pro! 🔐

1
Comments
1 min read
The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

16
Comments 4
4 min read
SSL: Your Website's Digital Seatbelt 🔒

SSL: Your Website's Digital Seatbelt 🔒

Comments
5 min read
Python Logging Best Practices - Obvious and Not-So-Obvious

Python Logging Best Practices - Obvious and Not-So-Obvious

5
Comments
10 min read
Lock Down Your Data: Implement Row-Level Security Policies in Supabase SQL

Lock Down Your Data: Implement Row-Level Security Policies in Supabase SQL

8
Comments
13 min read
Fantastic AWS Policies and Where to Find Them

Fantastic AWS Policies and Where to Find Them

2
Comments 1
9 min read
Security news weekly round-up - 22nd August 2025

Security news weekly round-up - 22nd August 2025

Comments
3 min read
🔐Security-Proofing My Full Stack App Against XSS Attacks (Cross-Site Scripting)

🔐Security-Proofing My Full Stack App Against XSS Attacks (Cross-Site Scripting)

6
Comments 2
2 min read
5 Fatal Mistakes: Why Your AI Agent Keeps Failing in Production

5 Fatal Mistakes: Why Your AI Agent Keeps Failing in Production

1
Comments
4 min read
Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Comments
10 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Comments
3 min read
Beyond Checksums: Securing File Transfers with HMAC-SHA256

Beyond Checksums: Securing File Transfers with HMAC-SHA256

Comments
3 min read
Derived Identity and System Personalization: A Vision Toward the Physical-Digital Link Through Robust Cryptography

Derived Identity and System Personalization: A Vision Toward the Physical-Digital Link Through Robust Cryptography

2
Comments
4 min read
Outil de Cybersécurité du Jour - Aug 21, 2025

Outil de Cybersécurité du Jour - Aug 21, 2025

Comments
3 min read
loading...