DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Frontend Protection: The Browser Static Analysis Standard

Frontend Protection: The Browser Static Analysis Standard

Comments
2 min read
Zero-Trust Auth: The JWT Static Analysis Standard

Zero-Trust Auth: The JWT Static Analysis Standard

Comments
3 min read
Runtime Security at Scale: The Node.js Static Analysis Standard

Runtime Security at Scale: The Node.js Static Analysis Standard

Comments
2 min read
Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Comments
2 min read
How to Add Audit Logs to Your App (The Complete Guide for Developers)

How to Add Audit Logs to Your App (The Complete Guide for Developers)

Comments
3 min read
Data Integrity & Anti-Cheating

Data Integrity & Anti-Cheating

Comments
3 min read
Server headers that talk too much

Server headers that talk too much

Comments
1 min read
Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models

Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models

2
Comments
2 min read
Agent Security Explained By Dawn Song

Agent Security Explained By Dawn Song

Comments
3 min read
Security news weekly round-up - 12th December 2025

Security news weekly round-up - 12th December 2025

2
Comments
3 min read
SENTINEL IMMUNE — Biological Immunity for IT Security

SENTINEL IMMUNE — Biological Immunity for IT Security

Comments
2 min read
5 Best Practices for Securing Amazon Bedrock Agents from Prompt Injections.

5 Best Practices for Securing Amazon Bedrock Agents from Prompt Injections.

4
Comments
2 min read
We built a Windows app that blocks trackers and encrypts your traffic automatically

We built a Windows app that blocks trackers and encrypts your traffic automatically

Comments
1 min read
Week 3 VPN Security: A Complete Quiz on Protocols, Attack Vectors & Defense Strategies

Week 3 VPN Security: A Complete Quiz on Protocols, Attack Vectors & Defense Strategies

Comments
15 min read
Building Least-Privilege Architectures with Kiro Assistance

Building Least-Privilege Architectures with Kiro Assistance

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.