DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Successfully Remove a Password from a PST File Without Data Loss?

How to Successfully Remove a Password from a PST File Without Data Loss?

1
Comments 3
1 min read
The Labors of Heracles as Risk Management for SMBs

The Labors of Heracles as Risk Management for SMBs

Comments
3 min read
The MCP Revolution: How One Protocol Solved AI's Biggest Integration Problem (Part 1 of 2)

The MCP Revolution: How One Protocol Solved AI's Biggest Integration Problem (Part 1 of 2)

1
Comments 1
5 min read
How To build the secret chat app using MLS and ChatE2EE

How To build the secret chat app using MLS and ChatE2EE

3
Comments 1
2 min read
The Rise of Zero Trust in 2025 — Why It’s More Than Just a Buzzword

The Rise of Zero Trust in 2025 — Why It’s More Than Just a Buzzword

Comments
2 min read
OpenAI's Warning: Why Prompt Injection is the Unsolvable Flaw of AI Agents

OpenAI's Warning: Why Prompt Injection is the Unsolvable Flaw of AI Agents

1
Comments
2 min read
File Upload Security Issues

File Upload Security Issues

Comments
5 min read
Cybersecurity Predictions for 2026

Cybersecurity Predictions for 2026

1
Comments 4
4 min read
My Takeaways from AWS re:Invent 2025: Bringing the Vegas Energy Home to Hong Kong 🇭🇰✨

My Takeaways from AWS re:Invent 2025: Bringing the Vegas Energy Home to Hong Kong 🇭🇰✨

6
Comments
3 min read
Currentonly Scopes in Google Apps Script

Currentonly Scopes in Google Apps Script

Comments
3 min read
Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples

Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples

1
Comments
9 min read
Is SQL Injection dead in 2025? Finding Critical Bugs in Item Pagination

Is SQL Injection dead in 2025? Finding Critical Bugs in Item Pagination

1
Comments
2 min read
Scaling the Adversarial Mindset: How We're Using AI and Knowledge Graphs for Pre-emptive Security

Scaling the Adversarial Mindset: How We're Using AI and Knowledge Graphs for Pre-emptive Security

Comments
4 min read
Why MLOps Needs Blockchain for True Data Integrity

Why MLOps Needs Blockchain for True Data Integrity

1
Comments
3 min read
How to Protect Model Context Protocol (MCP) Servers with OpenAM and OpenIG

How to Protect Model Context Protocol (MCP) Servers with OpenAM and OpenIG

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.