DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

2
Comments
4 min read
Understanding HOTP and TOTP in Two-Factor Authentication 10:35

Understanding HOTP and TOTP in Two-Factor Authentication

1
Comments
3 min read
HashGate - HMAC Authentication Implementation

HashGate - HMAC Authentication Implementation

Comments
7 min read
Build an Email OTP Verification System in Node.js (Step-by-Step)

Build an Email OTP Verification System in Node.js (Step-by-Step)

2
Comments
11 min read
Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

1
Comments
4 min read
Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Comments
2 min read
AutenticaciĂłn y verificaciĂłn de identidad (Captura, contenedor, firma y primer flujo de personalizaciĂłn)

AutenticaciĂłn y verificaciĂłn de identidad (Captura, contenedor, firma y primer flujo de personalizaciĂłn)

1
Comments
4 min read
Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

1
Comments
4 min read
Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

1
Comments
6 min read
What is Customer Identity and Access Management? Benefits and Examples

What is Customer Identity and Access Management? Benefits and Examples

1
Comments
2 min read
Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Comments
2 min read
Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

1
Comments
2 min read
GenesisDB - The GDPR-ready event-sourcing database engine

GenesisDB - The GDPR-ready event-sourcing database engine

1
Comments
1 min read
GitHub Security Notifications for Discord

GitHub Security Notifications for Discord

Comments
4 min read
Ghost Nodes: Red Teaming Social Graphs for Maximum Privacy

Ghost Nodes: Red Teaming Social Graphs for Maximum Privacy

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.