DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Datacenter Proxies Are a GDPR Liability (And What to Use Instead)

Why Datacenter Proxies Are a GDPR Liability (And What to Use Instead)

Comments
4 min read
Compromised npm Maintainer Account Publishes Malicious Axios Versions with Backdoor via `plain-crypto-js` Dependency

Compromised npm Maintainer Account Publishes Malicious Axios Versions with Backdoor via `plain-crypto-js` Dependency

Comments
11 min read
How I Manage My SSH Keys Across Multiple Servers and GitHub

How I Manage My SSH Keys Across Multiple Servers and GitHub

Comments
3 min read
Self-Host n8n with Cloudflare Zero Trust and Docker

Self-Host n8n with Cloudflare Zero Trust and Docker

Comments
5 min read
How we built zero-knowledge end-to-end encryption for a mobile AI coding agent companion

How we built zero-knowledge end-to-end encryption for a mobile AI coding agent companion

Comments
12 min read
AI-Native Threat Detection: Why the Edge is the New Frontline for IDS

AI-Native Threat Detection: Why the Edge is the New Frontline for IDS

Comments
7 min read
AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security

AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security

Comments
7 min read
Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)

Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)

Comments
2 min read
Next.js 14 Authentication and RBAC with App Router

Next.js 14 Authentication and RBAC with App Router

5
Comments
13 min read
The axios Supply Chain Attack Just Proved Why Static Analysis Matters More Than Ever

The axios Supply Chain Attack Just Proved Why Static Analysis Matters More Than Ever

Comments
4 min read
Zero Trust at the Edge: Securing Distributed SMB Networks in 2024

Zero Trust at the Edge: Securing Distributed SMB Networks in 2024

Comments
6 min read
Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Comments
10 min read
Implementing Zero Trust Architecture in IoT-Heavy Enterprise Networks

Implementing Zero Trust Architecture in IoT-Heavy Enterprise Networks

Comments
7 min read
Transforming Raspberry Pi into an AI-Native Edge IDS for SMBs

Transforming Raspberry Pi into an AI-Native Edge IDS for SMBs

Comments
7 min read
ClawHavoc and the Missing Layer: Why Scanning Agent Skills Isn't Enough

ClawHavoc and the Missing Layer: Why Scanning Agent Skills Isn't Enough

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.