DEV Community

Myth-Tech Security Framework Series' Articles

Back to Narnaiezzsshaa Truong's Series
Teaching OWASP Top 10 Through Visual Frameworks
Cover image for Teaching OWASP Top 10 Through Visual Frameworks

Teaching OWASP Top 10 Through Visual Frameworks

Comments
16 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure
Cover image for Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

4
Comments
9 min read
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology
Cover image for The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

3
Comments
8 min read
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence
Cover image for The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

Comments
3 min read
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity
Cover image for The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

Comments
7 min read
The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity
Cover image for The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

Comments
3 min read