close

DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Anthropic Just Leaked Claude Code's Source. Here's What That Means for Every AI Agent You Run.

Anthropic Just Leaked Claude Code's Source. Here's What That Means for Every AI Agent You Run.

Comments
9 min read
12 Steps to Secure GitHub Actions After the Trivy Attack

12 Steps to Secure GitHub Actions After the Trivy Attack

Comments
2 min read
I'm 18 and Built an Open-Source Camera That Cryptographically Proves Photos Are Real

I'm 18 and Built an Open-Source Camera That Cryptographically Proves Photos Are Real

Comments
3 min read
Why Datacenter Proxies Are a GDPR Liability (And What to Use Instead)

Why Datacenter Proxies Are a GDPR Liability (And What to Use Instead)

Comments
4 min read
Compromised npm Maintainer Account Publishes Malicious Axios Versions with Backdoor via `plain-crypto-js` Dependency

Compromised npm Maintainer Account Publishes Malicious Axios Versions with Backdoor via `plain-crypto-js` Dependency

Comments
11 min read
How I Manage My SSH Keys Across Multiple Servers and GitHub

How I Manage My SSH Keys Across Multiple Servers and GitHub

Comments
3 min read
Self-Host n8n with Cloudflare Zero Trust and Docker

Self-Host n8n with Cloudflare Zero Trust and Docker

Comments
5 min read
How we built zero-knowledge end-to-end encryption for a mobile AI coding agent companion

How we built zero-knowledge end-to-end encryption for a mobile AI coding agent companion

Comments
12 min read
AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security

AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security

Comments
7 min read
Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)

Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)

Comments
2 min read
AI-Native Threat Detection: Why the Edge is the New Frontline for IDS

AI-Native Threat Detection: Why the Edge is the New Frontline for IDS

Comments
7 min read
The axios Supply Chain Attack Just Proved Why Static Analysis Matters More Than Ever

The axios Supply Chain Attack Just Proved Why Static Analysis Matters More Than Ever

Comments
4 min read
Next.js 14 Authentication and RBAC with App Router

Next.js 14 Authentication and RBAC with App Router

BERJAYA BERJAYA BERJAYA 5
Comments
13 min read
Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Comments
10 min read
Zero Trust at the Edge: Securing Distributed SMB Networks in 2024

Zero Trust at the Edge: Securing Distributed SMB Networks in 2024

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.