DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hardening a Developer Portfolio

Hardening a Developer Portfolio

Comments
6 min read
Webauthn authentication with React and Nest.js

Webauthn authentication with React and Nest.js

2
Comments
13 min read
AWS Security & Cost Optimization Arsenal: From CLI to Lambda Automation

AWS Security & Cost Optimization Arsenal: From CLI to Lambda Automation

Comments
3 min read
Episode 1: Hunting Deprecated Lambda Runtimes — Before They Become Problems

Episode 1: Hunting Deprecated Lambda Runtimes — Before They Become Problems

Comments
6 min read
Invisible Ink for AI: Proof of Creation in a Generative World

Invisible Ink for AI: Proof of Creation in a Generative World

Comments
2 min read
Outil de Cybersécurité du Jour - Sep 1, 2025

Outil de Cybersécurité du Jour - Sep 1, 2025

1
Comments
3 min read
Why does big tech not run Accessibility bug bounties?

Why does big tech not run Accessibility bug bounties?

2
Comments 3
3 min read
Domain Suspended for Drive-By Malware Same-Day Unsuspension & 1,589-File Deep-Clean (Anonymized)

Domain Suspended for Drive-By Malware Same-Day Unsuspension & 1,589-File Deep-Clean (Anonymized)

Comments
4 min read
Kinde new features in August

Kinde new features in August

1
Comments
1 min read
Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Comments
2 min read
Adaptive Shields: AI's Counterpunch to Smart Jamming

Adaptive Shields: AI's Counterpunch to Smart Jamming

Comments
2 min read
Security news weekly round-up - 3rd October 2025

Security news weekly round-up - 3rd October 2025

2
Comments
3 min read
🌍 The Dark Side of Connectivity in a Digital Age

🌍 The Dark Side of Connectivity in a Digital Age

Comments
2 min read
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

Comments
2 min read
Secure SSH Shell Applications

Secure SSH Shell Applications

1
Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.