DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What Happens if We Get Hacked? A Transparent Look at the Musical Chairs Security Model

What Happens if We Get Hacked? A Transparent Look at the Musical Chairs Security Model

Comments
6 min read
Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

6
Comments 1
5 min read
How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

4
Comments
5 min read
7 Tips for Hardening TLS on Nginx for Secure Web Traffic and Performance

7 Tips for Hardening TLS on Nginx for Secure Web Traffic and Performance

Comments
3 min read
How to use JWTokens properly

How to use JWTokens properly

Comments
3 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

Comments
4 min read
Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

1
Comments
3 min read
Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Comments
2 min read
Building a Scalable AWS Multi-Account Environment with Control Tower, Terraform AFT, and SCP Guardrails

Building a Scalable AWS Multi-Account Environment with Control Tower, Terraform AFT, and SCP Guardrails

Comments
6 min read
Generate Strong, Reproducible Passwords with Patterns & Grids

Generate Strong, Reproducible Passwords with Patterns & Grids

Comments
1 min read
After 20 Years in Technology, AI is the First Thing That Actually Changed How I Work

After 20 Years in Technology, AI is the First Thing That Actually Changed How I Work

1
Comments
9 min read
Quantum Dawn: Hardening Our Networks Before the Storm

Quantum Dawn: Hardening Our Networks Before the Storm

Comments
2 min read
Hash Generator: The Complete Guide to Cryptographic Hashing

Hash Generator: The Complete Guide to Cryptographic Hashing

5
Comments
13 min read
Unlocking Ultra-Efficient Edge AI: Encrypted Inference at the Speed of Memory

Unlocking Ultra-Efficient Edge AI: Encrypted Inference at the Speed of Memory

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.