DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The $255M Wake-Up Call: How Cryptographic Audit Trails Could Have Caught a Quant Fund Fraud in Minutes, Not Years

The $255M Wake-Up Call: How Cryptographic Audit Trails Could Have Caught a Quant Fund Fraud in Minutes, Not Years

Comments
18 min read
How to Fix “Japanese Keyword Hack” in WordPress (The Hard Way)

How to Fix “Japanese Keyword Hack” in WordPress (The Hard Way)

Comments
4 min read
How to Prevent Fake Hidden Plugins from Reinstalling on WordPress

How to Prevent Fake Hidden Plugins from Reinstalling on WordPress

Comments
4 min read
Probability Is a Liability in Production

Probability Is a Liability in Production

Comments
2 min read
Why I’m building an "Intent-Aware" engine for API Governance (Technical Preview)

Why I’m building an "Intent-Aware" engine for API Governance (Technical Preview)

Comments
2 min read
The Ultimate Database That Makes Compliance Audits Effortless

The Ultimate Database That Makes Compliance Audits Effortless

Comments
6 min read
What We Learned Securing a SaaS Product with Automated DAST

What We Learned Securing a SaaS Product with Automated DAST

3
Comments
5 min read
How to Prevent AI Models from Training on Website Images

How to Prevent AI Models from Training on Website Images

1
Comments
5 min read
How Growing Apps Break Under Scale: Lessons From Real Systems

How Growing Apps Break Under Scale: Lessons From Real Systems

Comments
6 min read
IAM Auto-Remediation: Enforcing Least Privilege Automatically

IAM Auto-Remediation: Enforcing Least Privilege Automatically

1
Comments 1
4 min read
Smart Contract Security Engineering: How Real Protocols Break and How Developers Can Build Attack-Resistant Systems

Smart Contract Security Engineering: How Real Protocols Break and How Developers Can Build Attack-Resistant Systems

2
Comments
7 min read
Most Webhook Signatures Are Broken

Most Webhook Signatures Are Broken

1
Comments
3 min read
5 Best Practices for Securing Amazon SageMaker.

5 Best Practices for Securing Amazon SageMaker.

1
Comments
3 min read
You Built a Network of Snitches

You Built a Network of Snitches

Comments
11 min read
Convenience is eating security: why “one-click agents” need a stop button

Convenience is eating security: why “one-click agents” need a stop button

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.