DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building a Production-Ready AI Security Foundation

Building a Production-Ready AI Security Foundation

14
Comments 2
5 min read
File Permission on unix Systems

File Permission on unix Systems

1
Comments
6 min read
7 Urgent Fixes: Trend Micro Apex Central CVE-2025-69258

7 Urgent Fixes: Trend Micro Apex Central CVE-2025-69258

3
Comments
8 min read
Logistics Software Testing: How to Do Quality Assurance for Logistics

Logistics Software Testing: How to Do Quality Assurance for Logistics

Comments
13 min read
Corporate Wargames: Red Teams vs Blue Teams

Corporate Wargames: Red Teams vs Blue Teams

2
Comments
3 min read
The MEV Dark Pool Problem: Why Private Mempools Need Decentralized Verification

The MEV Dark Pool Problem: Why Private Mempools Need Decentralized Verification

Comments 2
4 min read
Goodbye Hidden Fields: Modern CSRF Protection Without Tokens

Goodbye Hidden Fields: Modern CSRF Protection Without Tokens

Comments 1
3 min read
The Baselines Most Teams Don't Know They're Missing

The Baselines Most Teams Don't Know They're Missing

2
Comments
2 min read
The Classic Bug: Command Injection in OpenCode's Server Mode

The Classic Bug: Command Injection in OpenCode's Server Mode

1
Comments
5 min read
AI Code Review for Compliance : Benefits and Best Practices

AI Code Review for Compliance : Benefits and Best Practices

Comments
4 min read
A CI-Style Testing Tool for AI Correctness, Safety, and Cost, Introducing Orbitđź’«

A CI-Style Testing Tool for AI Correctness, Safety, and Cost, Introducing Orbitđź’«

Comments
1 min read
Adversarial AI and Robustness Engineering: Attacks, Defenses, and Trust

Adversarial AI and Robustness Engineering: Attacks, Defenses, and Trust

Comments
6 min read
Remote Attestation, TEEs, and Why Confidential Computing Matters in Web3

Remote Attestation, TEEs, and Why Confidential Computing Matters in Web3

2
Comments 2
3 min read
Set Up SSO with Auth0 for Seamless App Access and Security

Set Up SSO with Auth0 for Seamless App Access and Security

1
Comments
5 min read
When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.