DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers

The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers

Comments 1
4 min read
Most Valuable When Least Visible | The Security Paradox

Most Valuable When Least Visible | The Security Paradox

Comments
3 min read
Face Recognition for Crypto: Enhancing Security and Trust

Face Recognition for Crypto: Enhancing Security and Trust

Comments
1 min read
Java Microservices on Kubernetes: A Step-by-Step Guide

Java Microservices on Kubernetes: A Step-by-Step Guide

Comments
1 min read
🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

5
Comments 2
3 min read
Mastering Kubernetes Security: A Practical Guide to Hardening Your Clusters

Mastering Kubernetes Security: A Practical Guide to Hardening Your Clusters

Comments
2 min read
Front-end Signing and Back-end Verification in JavaScript Applications

Front-end Signing and Back-end Verification in JavaScript Applications

3
Comments 2
2 min read
Securing Modern Systems: Advanced Threat Modeling for Cloud-Native & AI

Securing Modern Systems: Advanced Threat Modeling for Cloud-Native & AI

1
Comments
8 min read
How to Effectively Vet Your Supply Chain for Optimal Performance

How to Effectively Vet Your Supply Chain for Optimal Performance

5
Comments
4 min read
Digital Twin of the Universe: The Deep Anatomy of Networks and the Rise of Cyber Consciousness

Digital Twin of the Universe: The Deep Anatomy of Networks and the Rise of Cyber Consciousness

4
Comments
3 min read
Private 5G: The Game-Changer for Industrial IoT and Smart Factories

Private 5G: The Game-Changer for Industrial IoT and Smart Factories

Comments
6 min read
Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Comments
2 min read
The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

Comments 1
4 min read
Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects

Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects

2
Comments
6 min read
K3S pods connected from external systems without any service load balancer configured

K3S pods connected from external systems without any service load balancer configured

Comments 1
1 min read
How to Buy the Right SSL Certificate Without Overspending

How to Buy the Right SSL Certificate Without Overspending

1
Comments 1
3 min read
Working with API Rate Limits: Lessons from Developer Mistakes

Working with API Rate Limits: Lessons from Developer Mistakes

Comments
4 min read
Kali Linux Users Account Management.

Kali Linux Users Account Management.

1
Comments
19 min read
I Tested hcef: A Native C++ Encryption Module for Node.js That Deserves More Attention

I Tested hcef: A Native C++ Encryption Module for Node.js That Deserves More Attention

Comments
2 min read
How to clone documents with form fields in BoldSign

How to clone documents with form fields in BoldSign

2
Comments
4 min read
Securing No-Code/Low-Code Platforms: A Comprehensive Guide to Enterprise Security

Securing No-Code/Low-Code Platforms: A Comprehensive Guide to Enterprise Security

Comments
7 min read
How to Protect Your API with OpenFGA: From ReBAC Concepts to Practical Usage

How to Protect Your API with OpenFGA: From ReBAC Concepts to Practical Usage

5
Comments 2
17 min read
The Imperative of AI API Security: Protecting Your Intelligent Systems

The Imperative of AI API Security: Protecting Your Intelligent Systems

Comments
6 min read
What is Proxy Server: Forward vs. Reverse Proxy (Explained)

What is Proxy Server: Forward vs. Reverse Proxy (Explained)

Comments
6 min read
AI in Cybersecurity: Navigating the Ethical Minefield

AI in Cybersecurity: Navigating the Ethical Minefield

Comments 1
5 min read
loading...