DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer Changes

Why Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer Changes

1
Comments
4 min read
Google Zanzibar Deep Dive: Handling 2 Trillion ACLs in Under 10ms

Google Zanzibar Deep Dive: Handling 2 Trillion ACLs in Under 10ms

1
Comments 2
11 min read
The Hidden Cost of Phone-Based Auth: What I Learned After 18 Months

The Hidden Cost of Phone-Based Auth: What I Learned After 18 Months

Comments
8 min read
Why I Stopped Mocking 2FA in Tests (And What I Do Instead)

Why I Stopped Mocking 2FA in Tests (And What I Do Instead)

Comments
7 min read
The Verification Paradox: Why 100% of AI-Assisted Devs Face Incidents

The Verification Paradox: Why 100% of AI-Assisted Devs Face Incidents

Comments 1
2 min read
Don’t Trust, Verify — Continuously: UltrafastSecp256k1 Meets Frigate

Don’t Trust, Verify — Continuously: UltrafastSecp256k1 Meets Frigate

Comments
2 min read
Your private key doesn't belong in your terminal. Here's the Foundry fix.

Your private key doesn't belong in your terminal. Here's the Foundry fix.

Comments
2 min read
JWT vs Session vs OAuth2 in Spring Boot: Which One Should You Use?

JWT vs Session vs OAuth2 in Spring Boot: Which One Should You Use?

Comments
4 min read
I built a portable SIEM detection toolkit that converts Sigma rules to Splunk, Elastic, and Kibana queries

I built a portable SIEM detection toolkit that converts Sigma rules to Splunk, Elastic, and Kibana queries

Comments
2 min read
Anthropic Epic Fail: What Secrets Are Hiding in Claude Code Source?

Anthropic Epic Fail: What Secrets Are Hiding in Claude Code Source?

Comments
8 min read
How SkyeMeta Built a SCIF for AI Agents on InsumerAPI

How SkyeMeta Built a SCIF for AI Agents on InsumerAPI

Comments
5 min read
The Gap Between Encrypting Secrets and Proving You Handled Them Right

The Gap Between Encrypting Secrets and Proving You Handled Them Right

Comments
4 min read
Why Vibe Coding Needs Guardrails

Why Vibe Coding Needs Guardrails

Comments
4 min read
npm's Implicit Dependency Execution Exposes Users to Security Risks: Explicit Confirmation Needed

npm's Implicit Dependency Execution Exposes Users to Security Risks: Explicit Confirmation Needed

Comments
9 min read
Agent identity is solved. Agent trust is not.

Agent identity is solved. Agent trust is not.

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.