DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How I Run LLM Agents in a Secure Nix Sandbox

How I Run LLM Agents in a Secure Nix Sandbox

Comments
5 min read
Why Auth0 email_verified Was Missing from My Access Token (And How to Fix It)

Why Auth0 email_verified Was Missing from My Access Token (And How to Fix It)

Comments
3 min read
Why Does SOCKS5 Proxy Login Trigger Account Warnings or Failures When Switching Between Cloud and Local Access?

Why Does SOCKS5 Proxy Login Trigger Account Warnings or Failures When Switching Between Cloud and Local Access?

Comments
12 min read
Residential vs Dedicated Proxies: What "Dedicated" Means and How to Decide

Residential vs Dedicated Proxies: What "Dedicated" Means and How to Decide

Comments
15 min read
I built a Docker vulnerability scanner - Beta testers wanted!!!

I built a Docker vulnerability scanner - Beta testers wanted!!!

Comments
1 min read
Most Security Teams Can’t Scale Access Management Beyond 50 Employees - Here’s how to fix it

Most Security Teams Can’t Scale Access Management Beyond 50 Employees - Here’s how to fix it

Comments
6 min read
Application Layer: Where Software Meets the Network

Application Layer: Where Software Meets the Network

Comments
3 min read
Zero-Knowledge Security: Protecting Patient Privacy Through Client-Side Encryption

Zero-Knowledge Security: Protecting Patient Privacy Through Client-Side Encryption

Comments
3 min read
Did you know?

Did you know?

Comments
1 min read
Malicious Chrome Extensions Steal AI Chats: How to Protect Your Conversations in 2026

Malicious Chrome Extensions Steal AI Chats: How to Protect Your Conversations in 2026

1
Comments
4 min read
Designing Secure Plugin Architectures for Desktop Applications

Designing Secure Plugin Architectures for Desktop Applications

Comments
12 min read
Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)

Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)

3
Comments 1
4 min read
AiCybr: 60+ Privacy-Focused Tools in One Place

AiCybr: 60+ Privacy-Focused Tools in One Place

Comments
3 min read
Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.

Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.

Comments
1 min read
Protecting an EC2 hosted web application with AWS WAF in practice

Protecting an EC2 hosted web application with AWS WAF in practice

Comments
12 min read
Agent Security Explained By Dawn Song

Agent Security Explained By Dawn Song

Comments
3 min read
New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse

New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse

Comments 1
15 min read
The Modern Home Network Has No Safe Mode

The Modern Home Network Has No Safe Mode

2
Comments
5 min read
Meet Orion-Belt, Go ZeroTrust Bastion

Meet Orion-Belt, Go ZeroTrust Bastion

Comments
3 min read
How do I backup my identity files (SSH/GPG) without compromising them?

How do I backup my identity files (SSH/GPG) without compromising them?

Comments
3 min read
🔒 Deep Dive: Production-Grade Environment Variable Automation – Engineering Secrets at Scale

🔒 Deep Dive: Production-Grade Environment Variable Automation – Engineering Secrets at Scale

Comments
5 min read
How to Secure Vibe Coded Applications in 2026

How to Secure Vibe Coded Applications in 2026

Comments
5 min read
DDSS: Step-by-Step Explanation

DDSS: Step-by-Step Explanation

Comments
8 min read
VCP v1.1 Implementation Guide Released: Building Cryptographic Audit Trails for Trading Systems

VCP v1.1 Implementation Guide Released: Building Cryptographic Audit Trails for Trading Systems

Comments
4 min read
How a Crypto-Miner Infiltrated My Umami Analytics (and How I Defeated It)

How a Crypto-Miner Infiltrated My Umami Analytics (and How I Defeated It)

Comments
3 min read
loading...