DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
From SOP to CORS: Understanding the Web’s Cross‑Origin Security Model

From SOP to CORS: Understanding the Web’s Cross‑Origin Security Model

Comments
11 min read
7 Tips for Hardening Nginx on Ubuntu 22.04 for High‑Traffic Sites

7 Tips for Hardening Nginx on Ubuntu 22.04 for High‑Traffic Sites

Comments
3 min read
Fort Knox for AI: Protecting Your Models with Verifiable Split Learning

Fort Knox for AI: Protecting Your Models with Verifiable Split Learning

5
Comments
2 min read
A Universal Standard for Securing Prompts in AI Systems: Introducing UPSS

A Universal Standard for Securing Prompts in AI Systems: Introducing UPSS

4
Comments 2
4 min read
Fortress AI: Shielding Collaborative Models with Zero-Knowledge Verification

Fortress AI: Shielding Collaborative Models with Zero-Knowledge Verification

5
Comments
2 min read
Lockdown LLMs: Unleashing AI Power While Safeguarding User Privacy

Lockdown LLMs: Unleashing AI Power While Safeguarding User Privacy

1
Comments
2 min read
Unlocking AI's Secrets: The Prompt Seed Treasure Hunt by Arvind Sundararajan

Unlocking AI's Secrets: The Prompt Seed Treasure Hunt by Arvind Sundararajan

5
Comments
2 min read
Fort Knox AI: Verifiable Security for Distributed Machine Learning by Arvind Sundararajan

Fort Knox AI: Verifiable Security for Distributed Machine Learning by Arvind Sundararajan

5
Comments
2 min read
Securing Sessions in Spring Boot

Securing Sessions in Spring Boot

2
Comments
3 min read
CipherVault – Lightweight Browser-Based Encryption Tool

CipherVault – Lightweight Browser-Based Encryption Tool

Comments
1 min read
Lazy-Loading as a Security Measure

Lazy-Loading as a Security Measure

37
Comments 20
4 min read
Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

7
Comments
3 min read
SIM Bank: Legal and Illegal Uses, and Detection through Digital Forensics

SIM Bank: Legal and Illegal Uses, and Detection through Digital Forensics

Comments
3 min read
Guardian AI: Zero-Knowledge Proofs for Secure Split Learning

Guardian AI: Zero-Knowledge Proofs for Secure Split Learning

5
Comments
2 min read
🏢 The Next 50 Years of DevOps: Data Centers, Security, and the GPU-Driven AI Revolution

🏢 The Next 50 Years of DevOps: Data Centers, Security, and the GPU-Driven AI Revolution

3
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.