DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Mastering SSL Pinning in iOS: From Basics to Production

Mastering SSL Pinning in iOS: From Basics to Production

5
Comments 2
5 min read
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

1
Comments
4 min read
Outil de Cybersécurité du Jour - Sep 21, 2025

Outil de Cybersécurité du Jour - Sep 21, 2025

1
Comments
3 min read
Top Dependency Scanners: A Comprehensive Guide

Top Dependency Scanners: A Comprehensive Guide

Comments
6 min read
⚙️ New TEE vulnerabilities what’s up and who’s affected

⚙️ New TEE vulnerabilities what’s up and who’s affected

2
Comments 4
1 min read
30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

2
Comments
3 min read
Laravel APP_KEY vs Password Hashing: What Every Developer Should Know About Encryption & Hashing.

Laravel APP_KEY vs Password Hashing: What Every Developer Should Know About Encryption & Hashing.

4
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 16, 2025

Outil de Cybersécurité du Jour - Sep 16, 2025

Comments
3 min read
TemplateScorer

TemplateScorer

Comments
3 min read
When TEEs Fail Gracefully: How Oasis Survived the Battering RAM and Wiretap Attacks

When TEEs Fail Gracefully: How Oasis Survived the Battering RAM and Wiretap Attacks

2
Comments 3
3 min read
JWT vs OAuth 1.0 vs OAuth 2.0, What’s the Difference and When to Use Each?

JWT vs OAuth 1.0 vs OAuth 2.0, What’s the Difference and When to Use Each?

Comments
4 min read
Safely Collect User Feedback with Cloudflare Workers + Slack

Safely Collect User Feedback with Cloudflare Workers + Slack

4
Comments
4 min read
From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 3

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 3

1
Comments
3 min read
Bringing Shadow AI Into the Light: How Leaders Can Balance Innovation and Control

Bringing Shadow AI Into the Light: How Leaders Can Balance Innovation and Control

Comments
4 min read
From SOP to CORS: Understanding the Web’s Cross‑Origin Security Model

From SOP to CORS: Understanding the Web’s Cross‑Origin Security Model

Comments
11 min read
7 Tips for Hardening Nginx on Ubuntu 22.04 for High‑Traffic Sites

7 Tips for Hardening Nginx on Ubuntu 22.04 for High‑Traffic Sites

Comments
3 min read
Fort Knox for AI: Protecting Your Models with Verifiable Split Learning

Fort Knox for AI: Protecting Your Models with Verifiable Split Learning

5
Comments
2 min read
SSE-KMS: The Secret Keeper of Your Cloud Storage

SSE-KMS: The Secret Keeper of Your Cloud Storage

1
Comments
4 min read
A Universal Standard for Securing Prompts in AI Systems: Introducing UPSS

A Universal Standard for Securing Prompts in AI Systems: Introducing UPSS

5
Comments 2
4 min read
Fortress AI: Shielding Collaborative Models with Zero-Knowledge Verification

Fortress AI: Shielding Collaborative Models with Zero-Knowledge Verification

5
Comments
2 min read
Lockdown LLMs: Unleashing AI Power While Safeguarding User Privacy

Lockdown LLMs: Unleashing AI Power While Safeguarding User Privacy

1
Comments
2 min read
The Future of IT Outsourcing: How Companies Will Work Tomorrow

The Future of IT Outsourcing: How Companies Will Work Tomorrow

Comments
2 min read
Unlocking AI's Secrets: The Prompt Seed Treasure Hunt by Arvind Sundararajan

Unlocking AI's Secrets: The Prompt Seed Treasure Hunt by Arvind Sundararajan

5
Comments
2 min read
Fort Knox AI: Verifiable Security for Distributed Machine Learning by Arvind Sundararajan

Fort Knox AI: Verifiable Security for Distributed Machine Learning by Arvind Sundararajan

5
Comments
2 min read
Securing Sessions in Spring Boot

Securing Sessions in Spring Boot

2
Comments
3 min read
loading...