DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why I chose Cybersecurity (and why you might too)

Why I chose Cybersecurity (and why you might too)

Comments 1
1 min read
Why I stopped rebuilding auth from scratch and built a universal trust layer instead

Why I stopped rebuilding auth from scratch and built a universal trust layer instead

Comments
2 min read
How I handle bulk WHOIS lookups at scale: lessons from running a domain API

How I handle bulk WHOIS lookups at scale: lessons from running a domain API

Comments
4 min read
# Supercharging My SOC Pipeline With VirusTotal Enrichment — Know Your Attacker Before You Block Them

# Supercharging My SOC Pipeline With VirusTotal Enrichment — Know Your Attacker Before You Block Them

Comments
5 min read
Our Auditor Asked How We Prove Logs Aren

Our Auditor Asked How We Prove Logs Aren

Comments
5 min read
Closed-Loop IAM Remediation: Auto-Fixing Security Misconfigurations Without a Human in the Loop

Closed-Loop IAM Remediation: Auto-Fixing Security Misconfigurations Without a Human in the Loop

Comments
7 min read
Biometric Key Rotation: Securing Tunnels with Real-Time Wearable Entropy

Biometric Key Rotation: Securing Tunnels with Real-Time Wearable Entropy

Comments
12 min read
🦞 I Built a Safe Autonomous Email Agent with OpenClaw and It Actually Works

OpenClaw Challenge Submission 🦞

🦞 I Built a Safe Autonomous Email Agent with OpenClaw and It Actually Works

5
Comments 1
3 min read
I Fingerprinted 6 Commercial VPNs in 200ms with Open-Source DPI. Here's the Wireshark Data

I Fingerprinted 6 Commercial VPNs in 200ms with Open-Source DPI. Here's the Wireshark Data

1
Comments 1
4 min read
Why AI Is Breaking Your API Security Model (And Nobody on Your Team Notices)

Why AI Is Breaking Your API Security Model (And Nobody on Your Team Notices)

1
Comments 1
3 min read
How I Built a Scalable and Secure Streaming Backend with Python (Production Lessons)

How I Built a Scalable and Secure Streaming Backend with Python (Production Lessons)

Comments
3 min read
KEIBIDROP: Secure File Transfer!

KEIBIDROP: Secure File Transfer!

Comments
1 min read
SOC 2 Type II readiness is an evidence-velocity problem

SOC 2 Type II readiness is an evidence-velocity problem

Comments
8 min read
How to Detect Prompt Injection in Your LLM Agent — Python, 5 Minutes

How to Detect Prompt Injection in Your LLM Agent — Python, 5 Minutes

Comments
5 min read
Add a Consent Screen to Your OIDC Authorization Server with Hono

Add a Consent Screen to Your OIDC Authorization Server with Hono

1
Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.