DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
HireFlow: For candidates, recruiters, and companies

HireFlow: For candidates, recruiters, and companies

7
Comments
4 min read
Implementing authorization for a Web3-based CMS

Implementing authorization for a Web3-based CMS

11
Comments
4 min read
ATLSecCon 2025: Security Readiness Means Human Readiness

ATLSecCon 2025: Security Readiness Means Human Readiness

Comments
7 min read
Viskify — Hiring on Proof, Not Promises, with Permit.io-Powered RBAC & Verifiable Credentials

Viskify — Hiring on Proof, Not Promises, with Permit.io-Powered RBAC & Verifiable Credentials

2
Comments
3 min read
Exploring the MCP Ecosystem: Looking Under the Hood

Exploring the MCP Ecosystem: Looking Under the Hood

1
Comments
15 min read
Zedd : AI-Powered Knowledge Base with Fine-Grained AI Access Control Using Permit.io

Zedd : AI-Powered Knowledge Base with Fine-Grained AI Access Control Using Permit.io

72
Comments 2
4 min read
Nextgen-mft: Secure, AI-powered Managed File Transfer (SFTP/HTTPS + Crypto + Anomaly Detection)

Nextgen-mft: Secure, AI-powered Managed File Transfer (SFTP/HTTPS + Crypto + Anomaly Detection)

1
Comments 1
2 min read
Authorization in MCP Server with Permit.io - A JIRA-like Task Management API

Authorization in MCP Server with Permit.io - A JIRA-like Task Management API

9
Comments 1
4 min read
PermitBlog: Headless Blog with Built-in Access Control

PermitBlog: Headless Blog with Built-in Access Control

22
Comments
10 min read
macOS Security in 2025: Why Your Mac Isn’t as Safe as You Think (And What IT Teams Are Doing About It)

macOS Security in 2025: Why Your Mac Isn’t as Safe as You Think (And What IT Teams Are Doing About It)

Comments
3 min read
Secure Your CI/CD Pipeline with Jenkins, ArgoCD, and Vault – A Hands-On DevSecOps Guide

Secure Your CI/CD Pipeline with Jenkins, ArgoCD, and Vault – A Hands-On DevSecOps Guide

2
Comments
16 min read
API Key Vs. OAuth – How to Choose the best Authentication

API Key Vs. OAuth – How to Choose the best Authentication

4
Comments 1
16 min read
Re-stake. Reinforce. Revolutionize

Re-stake. Reinforce. Revolutionize

7
Comments
2 min read
Detect and fix vulnerabilities (CVE) & misconfigurations (IaC) for your web application

Detect and fix vulnerabilities (CVE) & misconfigurations (IaC) for your web application

Comments
1 min read
FinCRM API — Externalised Authorisation with Permit.io

FinCRM API — Externalised Authorisation with Permit.io

Comments
3 min read
RBAC vs. LBAC: Which Scales for Multi-Tenant Dashboards?

RBAC vs. LBAC: Which Scales for Multi-Tenant Dashboards?

Comments
4 min read
MediSecure API Gateway - API-First Authorization for Healthcare

MediSecure API Gateway - API-First Authorization for Healthcare

2
Comments
6 min read
SECURING CONTENT: A Custom Content Management Dashboard.

SECURING CONTENT: A Custom Content Management Dashboard.

3
Comments
4 min read
Another jamathon thingy, but this time with authZ

Another jamathon thingy, but this time with authZ

1
Comments
3 min read
SecureLens 🔍: An LLM you can trust.

SecureLens 🔍: An LLM you can trust.

Comments
3 min read
The Importance of Password Entropy in Cybersecurity: Strengthening Your Defenses Against Brute-Force Attacks

The Importance of Password Entropy in Cybersecurity: Strengthening Your Defenses Against Brute-Force Attacks

13
Comments
5 min read
Sentinel AI: Chat Boundaries, Defined by Policy

Sentinel AI: Chat Boundaries, Defined by Policy

6
Comments
2 min read
A Safer Container Runtime

A Safer Container Runtime

Comments
4 min read
𝗨𝗻𝗹𝗼𝗰𝗸 𝘁𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗦𝘄𝗮𝗴𝗴𝗲𝗿 𝘄𝗶𝘁𝗵 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗶𝗻 𝗦𝗽𝗿𝗶𝗻𝗴 𝗕𝗼𝗼𝘁! 🚀

𝗨𝗻𝗹𝗼𝗰𝗸 𝘁𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗦𝘄𝗮𝗴𝗴𝗲𝗿 𝘄𝗶𝘁𝗵 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗶𝗻 𝗦𝗽𝗿𝗶𝗻𝗴 𝗕𝗼𝗼𝘁! 🚀

Comments
1 min read
Permit-Powered Task Manager: API-First Access Control in Action

Permit-Powered Task Manager: API-First Access Control in Action

16
Comments
5 min read
loading...