DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Stopping Bad Actors: Inside 1Password’s Security Model

Stopping Bad Actors: Inside 1Password’s Security Model

Comments
7 min read
Audio Deepfakes: The Detection Illusion

Audio Deepfakes: The Detection Illusion

1
Comments
2 min read
AI Unleashed: Secure LLM Inference for Everyone

AI Unleashed: Secure LLM Inference for Everyone

5
Comments
2 min read
AI Unleashed, Privacy Preserved: The Future of Secure LLMs by Arvind Sundararajan

AI Unleashed, Privacy Preserved: The Future of Secure LLMs by Arvind Sundararajan

1
Comments
2 min read
Unlock AI Insights, Protect Your Secrets: Privacy-First LLMs Are Here!

Unlock AI Insights, Protect Your Secrets: Privacy-First LLMs Are Here!

1
Comments
2 min read
Audio Deepfakes: The Achilles' Heel in Voice Biometrics

Audio Deepfakes: The Achilles' Heel in Voice Biometrics

1
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 14, 2025

Outil de Cybersécurité du Jour - Sep 14, 2025

5
Comments
2 min read
Audio Deepfakes: The Hidden Flaw in Our Defenses by Arvind Sundararajan

Audio Deepfakes: The Hidden Flaw in Our Defenses by Arvind Sundararajan

1
Comments
2 min read
Airdrops are safe but what about dusting 🤔 How to distinguish the two

Airdrops are safe but what about dusting 🤔 How to distinguish the two

Comments
5 min read
AI for Everyone: Secure Language Models Without the Hardware Hype

AI for Everyone: Secure Language Models Without the Hardware Hype

1
Comments
2 min read
Building an HTTP Server from Scratch in C: A Journey into Network Programming

Building an HTTP Server from Scratch in C: A Journey into Network Programming

4
Comments 2
6 min read
A Developer's Guide: How to Integrate a Payment Gateway Into a Website

A Developer's Guide: How to Integrate a Payment Gateway Into a Website

Comments
6 min read
How I lost $996,000 through Zoom

How I lost $996,000 through Zoom

5
Comments
5 min read
Real-Time Fraud Detection Using Apache Flink

Real-Time Fraud Detection Using Apache Flink

Comments
1 min read
David Gilbertson Warned us About The Latest NPM Attack

David Gilbertson Warned us About The Latest NPM Attack

Comments
1 min read
Creating and Maintaining Chroot Environments

Creating and Maintaining Chroot Environments

2
Comments
5 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

1
Comments
4 min read
Prompt Injection 2.0: The New Frontier of AI Attacks

Prompt Injection 2.0: The New Frontier of AI Attacks

3
Comments
7 min read
7 Tips for Securing SSH Key Management on Linux Servers

7 Tips for Securing SSH Key Management on Linux Servers

1
Comments
3 min read
Securing Frontend Apps from Lodash Issues

Securing Frontend Apps from Lodash Issues

5
Comments
3 min read
Client vs Server-Side Encryption: The Real Meaning of End-to-End Security

Client vs Server-Side Encryption: The Real Meaning of End-to-End Security

3
Comments 4
7 min read
Less Dependencies, Less Problems: How to keep node.js Package Footprint Minimal

Less Dependencies, Less Problems: How to keep node.js Package Footprint Minimal

1
Comments
3 min read
From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 1

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 1

13
Comments 1
2 min read
loading...