DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Comments
10 min read
The Claude CLI "Leak": Nobody Won, AI Still Hallucinates, and Companies Are Still Making the Same Mistake

The Claude CLI "Leak": Nobody Won, AI Still Hallucinates, and Companies Are Still Making the Same Mistake

2
Comments
7 min read
ClawHavoc and the Missing Layer: Why Scanning Agent Skills Isn't Enough

ClawHavoc and the Missing Layer: Why Scanning Agent Skills Isn't Enough

Comments
3 min read
Production VPS Security Architecture for Node.js & Web3 Backends (WireGuard + auditd + Grafana Alerts)

Production VPS Security Architecture for Node.js & Web3 Backends (WireGuard + auditd + Grafana Alerts)

Comments
1 min read
Your .env File Might Be Public Right Now

Your .env File Might Be Public Right Now

Comments
4 min read
Why Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer Changes

Why Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer Changes

1
Comments
4 min read
Home Router Hardening Checklist: 10 Settings to Change Right Now

Home Router Hardening Checklist: 10 Settings to Change Right Now

Comments
4 min read
Google Zanzibar Deep Dive: Handling 2 Trillion ACLs in Under 10ms

Google Zanzibar Deep Dive: Handling 2 Trillion ACLs in Under 10ms

1
Comments 2
11 min read
Why I Stopped Mocking 2FA in Tests (And What I Do Instead)

Why I Stopped Mocking 2FA in Tests (And What I Do Instead)

Comments
7 min read
Pi-hole Setup Guide: Block Ads and Malware for Every Device on Your Network

Pi-hole Setup Guide: Block Ads and Malware for Every Device on Your Network

Comments
4 min read
The Verification Paradox: Why 100% of AI-Assisted Devs Face Incidents

The Verification Paradox: Why 100% of AI-Assisted Devs Face Incidents

Comments 1
2 min read
The Hidden Cost of Phone-Based Auth: What I Learned After 18 Months

The Hidden Cost of Phone-Based Auth: What I Learned After 18 Months

Comments
8 min read
Your private key doesn't belong in your terminal. Here's the Foundry fix.

Your private key doesn't belong in your terminal. Here's the Foundry fix.

Comments
2 min read
JWT vs Session vs OAuth2 in Spring Boot: Which One Should You Use?

JWT vs Session vs OAuth2 in Spring Boot: Which One Should You Use?

Comments
4 min read
Don’t Trust, Verify — Continuously: UltrafastSecp256k1 Meets Frigate

Don’t Trust, Verify — Continuously: UltrafastSecp256k1 Meets Frigate

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.