DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
5 platform that pay huge if you're an Ethical H4CK3R

5 platform that pay huge if you're an Ethical H4CK3R

Comments
2 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense ๐ŸŒ

Simplifying Cybersecurity: Key Principles for a Robust Defense ๐ŸŒ

6
Comments
4 min read
๐ŸŽฃ Phishing Websites: When Web Development and Cybersecurity Come Together

๐ŸŽฃ Phishing Websites: When Web Development and Cybersecurity Come Together

Comments
3 min read
Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Comments
9 min read
What is a Rootkit?

What is a Rootkit?

Comments
2 min read
Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

1
Comments
4 min read
Cross-Device Passkey Sync Between Web, iOS, Android App

Cross-Device Passkey Sync Between Web, iOS, Android App

5
Comments
2 min read
11 tips to spot Phishing Attack

11 tips to spot Phishing Attack

Comments
5 min read
Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Comments
2 min read
Phishing Attack

Phishing Attack

1
Comments
2 min read
Why developers should learn hacking (and vice versa)

Why developers should learn hacking (and vice versa)

Comments
2 min read
How to Improve Your Website Security in 2024

How to Improve Your Website Security in 2024

2
Comments
5 min read
Why is Web App and API Security Testing So Critical?

Why is Web App and API Security Testing So Critical?

Comments
4 min read
What is Spyware?

What is Spyware?

1
Comments
2 min read
What is Adware?

What is Adware?

Comments
2 min read
The Essential Guide to SaaS Compliance

The Essential Guide to SaaS Compliance

Comments
6 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration

Bridging the Cloud Security Gap: From Innovation to Operational Integration

Comments
2 min read
Embracing the Code: A Journey from Curious Kid to Microsoft Project Manager

Embracing the Code: A Journey from Curious Kid to Microsoft Project Manager

Comments
3 min read
๐ŸŒŸ Mastering the Art of Consistency in Tech: My Journey and Strategies ๐ŸŒŸ

๐ŸŒŸ Mastering the Art of Consistency in Tech: My Journey and Strategies ๐ŸŒŸ

3
Comments
3 min read
Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Comments
3 min read
Mapping A Network (NMap)

Mapping A Network (NMap)

Comments
3 min read
Secure Development Practices to Safeguard Your Software

Secure Development Practices to Safeguard Your Software

Comments
3 min read
Software Supply Chain Awareness at Scale

Software Supply Chain Awareness at Scale

Comments
3 min read
Pi Minimal Workstation

Pi Minimal Workstation

Comments
4 min read
loading...