DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Enhancing Security with FacePlugin’s ID Card Recognition from 200 countries

Enhancing Security with FacePlugin’s ID Card Recognition from 200 countries

Comments
2 min read
Top Low-Cost Cybersecurity Measures

Top Low-Cost Cybersecurity Measures

Comments 1
4 min read
Boost Business Efficiency: Top 5 Workplace Technologies

Boost Business Efficiency: Top 5 Workplace Technologies

Comments
2 min read
Create your own card game with OWASP® Cornucopia

Create your own card game with OWASP® Cornucopia

Comments
2 min read
Types of Computer Security Threats

Types of Computer Security Threats

Comments
8 min read
5 Essential Cybersecurity Tips to Secure Your Business in 2024

5 Essential Cybersecurity Tips to Secure Your Business in 2024

Comments
3 min read
BSides Knoxville 2024: A Community Celebrating A Decade of Cybersecurity

BSides Knoxville 2024: A Community Celebrating A Decade of Cybersecurity

Comments
5 min read
Secure your enterprise critical assets from secret sprawl

Secure your enterprise critical assets from secret sprawl

Comments
4 min read
Understanding Cybersecurity: A Beginner’s Guide

Understanding Cybersecurity: A Beginner’s Guide

Comments
3 min read
What are cyber security tools? Why are they important?

What are cyber security tools? Why are they important?

Comments
5 min read
The Crucial Risk Assessment Template for Cybersecurity

The Crucial Risk Assessment Template for Cybersecurity

Comments
7 min read
Passkeys & Dynamic Linking

Passkeys & Dynamic Linking

Comments
2 min read
How to identify a phishing Email in 2024

How to identify a phishing Email in 2024

7
Comments
6 min read
7 Ways to Improve Asset Visibility

7 Ways to Improve Asset Visibility

Comments
7 min read
PSD3 & PSR Implications for Passkey Authentication

PSD3 & PSR Implications for Passkey Authentication

Comments
3 min read
Identity and Access Management: Why it is an Absolute Necessity Today

Identity and Access Management: Why it is an Absolute Necessity Today

Comments
4 min read
Upstream preview: Welcome to Upstream 2024

Upstream preview: Welcome to Upstream 2024

Comments
3 min read
Upstream preview: The value of open source software

Upstream preview: The value of open source software

Comments
3 min read
Are Passkeys SCA-Compliant?

Are Passkeys SCA-Compliant?

Comments
3 min read
What are the PSD2 & SCA Requirements?

What are the PSD2 & SCA Requirements?

Comments
3 min read
BSides312 2024: Insights and Innovations in Cybersecurity

BSides312 2024: Insights and Innovations in Cybersecurity

Comments
6 min read
Deepfake Technologies Can Steal Your Identity Even if You Don’t Use Generative AI

Deepfake Technologies Can Steal Your Identity Even if You Don’t Use Generative AI

Comments
3 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
What is Privileged Access Management (PAM)?

What is Privileged Access Management (PAM)?

Comments
2 min read
Workday Security: Everything You Need to Know

Workday Security: Everything You Need to Know

1
Comments
7 min read
Leveraging Automation and Expertise in SIEM Systems

Leveraging Automation and Expertise in SIEM Systems

Comments
3 min read
Path Traversal: The Hidden Threat to Your Data

Path Traversal: The Hidden Threat to Your Data

1
Comments
6 min read
Mastering Value Creation: Essential Tips for MSPs

Mastering Value Creation: Essential Tips for MSPs

Comments
3 min read
BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

Comments
6 min read
Trends and Future Prospects of SIEM Systems

Trends and Future Prospects of SIEM Systems

Comments
4 min read
Cyber Attacks Prevention Methods

Cyber Attacks Prevention Methods

1
Comments
4 min read
Top 9 Security Tips for Safe Email Marketing

Top 9 Security Tips for Safe Email Marketing

Comments
2 min read
My Linux Journey: From Cyber Security Newbie to Enthusiast

My Linux Journey: From Cyber Security Newbie to Enthusiast

Comments 3
2 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

1
Comments
15 min read
Why you should deprecate the Resource Owner Password Credentials (ROPC) grant type

Why you should deprecate the Resource Owner Password Credentials (ROPC) grant type

10
Comments
5 min read
Rising Like A Phoenix, ShowMeCon 2024 Resurrects A Security Community In The Midwest

Rising Like A Phoenix, ShowMeCon 2024 Resurrects A Security Community In The Midwest

4
Comments
6 min read
How to Protect Business and Employee Information: Top 5 Tips

How to Protect Business and Employee Information: Top 5 Tips

5
Comments
3 min read
How Passkeys Protect Against Phishing

How Passkeys Protect Against Phishing

2
Comments
2 min read
Understanding Spillage in Cyber Awareness

Understanding Spillage in Cyber Awareness

Comments
5 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
Shoulder Surfing: Definition and Prevention Strategies

Shoulder Surfing: Definition and Prevention Strategies

1
Comments
3 min read
Happy Internet Day to all Developer Community!

Happy Internet Day to all Developer Community!

2
Comments
1 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
8 Essential Components Every Dynamic Risk Assessment Must Have

8 Essential Components Every Dynamic Risk Assessment Must Have

Comments
7 min read
Revolutionizing Security Operations: The Power of AI Integration

Revolutionizing Security Operations: The Power of AI Integration

Comments
3 min read
Social engineering

Social engineering

26
Comments
10 min read
Build an Antivirus with Python (Beginners Guide)

Build an Antivirus with Python (Beginners Guide)

8
Comments
9 min read
OWASP® Cornucopia 2.0

OWASP® Cornucopia 2.0

21
Comments 1
6 min read
Issue 44 of AWS Cloud Security Weekly

Issue 44 of AWS Cloud Security Weekly

1
Comments
1 min read
How to Create a Successful Cybersecurity Strategy?

How to Create a Successful Cybersecurity Strategy?

Comments
7 min read
The Pyramid of Pain: A Threat Intelligence Concept

The Pyramid of Pain: A Threat Intelligence Concept

3
Comments
1 min read
Exposing the Deception: Discord Account Generator with Hidden Malware

Exposing the Deception: Discord Account Generator with Hidden Malware

15
Comments 2
5 min read
Mobile Security Tools part 2: Frida

Mobile Security Tools part 2: Frida

10
Comments
3 min read
AI in IT: How Artificial Intelligence Will Transform the IT industry

AI in IT: How Artificial Intelligence Will Transform the IT industry

Comments
4 min read
Top 6 Ransomware Defense Tactics You Must Know

Top 6 Ransomware Defense Tactics You Must Know

1
Comments
2 min read
Understanding OTP SMS Bombing

Understanding OTP SMS Bombing

1
Comments
2 min read
Pipeline Integrity and Security in DevSecOps

Pipeline Integrity and Security in DevSecOps

Comments
11 min read
Exploring Supply Chain and Cybersecurity Innovations in Full Stack Coding: An Insider's Take

Exploring Supply Chain and Cybersecurity Innovations in Full Stack Coding: An Insider's Take

Comments
3 min read
SAST Scanning with SonarQube and Docker

SAST Scanning with SonarQube and Docker

9
Comments
10 min read
How to Select the Right Data Discovery Tool for Your Requirements

How to Select the Right Data Discovery Tool for Your Requirements

Comments
8 min read
loading...