close

DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
TrueNAS Setup Guide: Enterprise Security at Home

TrueNAS Setup Guide: Enterprise Security at Home

Comments
11 min read
[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

Comments
2 min read
The Solana Buffer Recovery Problem Nobody Talks About

The Solana Buffer Recovery Problem Nobody Talks About

Comments
3 min read
600,000 Lines of AI-Generated Code: What We Found Inside a Production SaaS

600,000 Lines of AI-Generated Code: What We Found Inside a Production SaaS

Comments
5 min read
Java Meets Queryable Encryption: Developing a Secure Bank Account Application

Java Meets Queryable Encryption: Developing a Secure Bank Account Application

Comments
17 min read
Is Lovable Actually Secure? I Checked the Supabase RLS on 50 Apps

Is Lovable Actually Secure? I Checked the Supabase RLS on 50 Apps

Image 1
Comments
3 min read
How to Grant Temporary Read-Only Access to a Kubernetes Cluster

How to Grant Temporary Read-Only Access to a Kubernetes Cluster

Image Image Image 4
Comments
4 min read
We Scanned the Cyber Insurers. Their DMARC Failed.

We Scanned the Cyber Insurers. Their DMARC Failed.

Comments
6 min read
Bugmageddon Is Real. But Bug Discovery Isn’t the Real Bottleneck Anymore.

Bugmageddon Is Real. But Bug Discovery Isn’t the Real Bottleneck Anymore.

Comments
2 min read
UK Government Confirms AI That Completes Corporate Network Attacks Autonomously — What the AISI Evaluation Actually Found

UK Government Confirms AI That Completes Corporate Network Attacks Autonomously — What the AISI Evaluation Actually Found

Comments
3 min read
I built a quantum vulnerability scanner in 2 weeks — here's what I learned

I built a quantum vulnerability scanner in 2 weeks — here's what I learned

Comments
2 min read
Two Auth Problems: How MyAirports Handles Identity on Both Sides of the API

Two Auth Problems: How MyAirports Handles Identity on Both Sides of the API

Comments
6 min read
Portable scope tokens: prove what your agent can do without calling home

Portable scope tokens: prove what your agent can do without calling home

Comments
3 min read
The Security Lindy Effect: What Smart Contracts Can Teach Us About Software Security in the Age of AI

The Security Lindy Effect: What Smart Contracts Can Teach Us About Software Security in the Age of AI

Comments
3 min read
Secrets Management — Vault, SSM, and Secrets Manager Compared

Secrets Management — Vault, SSM, and Secrets Manager Compared

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.