DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Most Node.js Authentication Projects Break in Production (Lessons From Real Systems)

Why Most Node.js Authentication Projects Break in Production (Lessons From Real Systems)

Comments
2 min read
Security news weekly round-up - 9th January 2026

Security news weekly round-up - 9th January 2026

Comments
2 min read
What is cyber security and why is it important in today’s digital world?

What is cyber security and why is it important in today’s digital world?

Comments
1 min read
Why Your AI Agents Need a Secure Sandbox

Why Your AI Agents Need a Secure Sandbox

Comments
2 min read
Designing Secure-by-Design Cloud Platforms for Regulated Industries

Designing Secure-by-Design Cloud Platforms for Regulated Industries

Comments
8 min read
Hardware Binding in C#: Choosing the Right Computer Locking Strategy

Hardware Binding in C#: Choosing the Right Computer Locking Strategy

Comments
6 min read
Master Image Metadata: EXIF for AI Images, Privacy Protection & Photo Management

Master Image Metadata: EXIF for AI Images, Privacy Protection & Photo Management

Comments
9 min read
SaijinOS meets SENTINEL: Two Architectures for Human-AI Trust

SaijinOS meets SENTINEL: Two Architectures for Human-AI Trust

2
Comments 2
3 min read
Concerning Amounts of Malware in the VS Code Marketplace: What Microsoft’s Own Logs Reveal

Concerning Amounts of Malware in the VS Code Marketplace: What Microsoft’s Own Logs Reveal

12
Comments
3 min read
Building Own MAC (Message Authentication Code): Part 1 - Encrypted, but Not Trusted

Building Own MAC (Message Authentication Code): Part 1 - Encrypted, but Not Trusted

Comments
5 min read
Sanctum: Cryptographically Deniable Vault System with IPFS Storage

Sanctum: Cryptographically Deniable Vault System with IPFS Storage

Comments
5 min read
Why OWASP-Aligned Testing Alone Isn’t Enough and How ZeroThreat Goes Further

Why OWASP-Aligned Testing Alone Isn’t Enough and How ZeroThreat Goes Further

Comments
4 min read
Implementing Security Lake in AWS GovCloud for FedRAMP High Compliance

Implementing Security Lake in AWS GovCloud for FedRAMP High Compliance

1
Comments
11 min read
I was tired of copying .env files between machines, so we built a CLI

I was tired of copying .env files between machines, so we built a CLI

Comments
1 min read
Browser-Based kubectl Access: Managing Kubernetes Without Bastion Hosts

Browser-Based kubectl Access: Managing Kubernetes Without Bastion Hosts

Comments
4 min read
Offline License Activation with QR Codes: Serving Air-Gapped Environments in C#

Offline License Activation with QR Codes: Serving Air-Gapped Environments in C#

Comments
11 min read
React2Shell Aftermath: Analyzing the Critical Prototype Pollution Vulnerability in React Server Components

React2Shell Aftermath: Analyzing the Critical Prototype Pollution Vulnerability in React Server Components

Comments
2 min read
Why WebAuthn Feels Easy — Until You Try to Ship It

Why WebAuthn Feels Easy — Until You Try to Ship It

Comments
2 min read
How Python Developers Help Build Secure and High-Performance Applications

How Python Developers Help Build Secure and High-Performance Applications

Comments
3 min read
Day 5: C Strings: The Danger of the Null Terminator (\0)

Day 5: C Strings: The Danger of the Null Terminator (\0)

Comments 1
1 min read
Most “Private” Apps Still Leak More Than You Think

Most “Private” Apps Still Leak More Than You Think

Comments
2 min read
The Future of IaC Security: Scanning, Drift Detection and Autoremediation

The Future of IaC Security: Scanning, Drift Detection and Autoremediation

Comments
6 min read
How to protect server functions with auth middleware in TanStack Start

How to protect server functions with auth middleware in TanStack Start

2
Comments 1
3 min read
Logging Into EC2 Is Easy… Until You Pick the Wrong Way

Logging Into EC2 Is Easy… Until You Pick the Wrong Way

1
Comments 1
3 min read
Building a Fail-Closed Investment Risk Gate with Yuer DSL

Building a Fail-Closed Investment Risk Gate with Yuer DSL

Comments
3 min read
loading...