DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

Comments
34 min read
💎 ANN: stone_checksums v1.0.2

💎 ANN: stone_checksums v1.0.2

7
Comments
2 min read
IA e Segurança de Software: Automação ou Novo Vetor de Ataques?

IA e Segurança de Software: Automação ou Novo Vetor de Ataques?

Comments
11 min read
The Silent Risk Inside Your Enterprise Security: Why CISOs Must Replace Shadow AI with Sovereign AI

The Silent Risk Inside Your Enterprise Security: Why CISOs Must Replace Shadow AI with Sovereign AI

8
Comments
4 min read
Infoscava Plugin Creator: Expanding Analysis Capabilities

Infoscava Plugin Creator: Expanding Analysis Capabilities

5
Comments
1 min read
How to Protect an Application from Cyber Attacks

How to Protect an Application from Cyber Attacks

5
Comments
2 min read
AWS Network Firewall: Your Shield for a Secure Cloud

AWS Network Firewall: Your Shield for a Secure Cloud

Comments
6 min read
🔐 Kubernetes Secrets & ConfigMaps: Securely Manage Your App Configurations

🔐 Kubernetes Secrets & ConfigMaps: Securely Manage Your App Configurations

5
Comments
3 min read
How I created a successful recon tool for bug hunters and how you can build one too

How I created a successful recon tool for bug hunters and how you can build one too

Comments
10 min read
AWS VPC : Basics Of VPC Network Security

AWS VPC : Basics Of VPC Network Security

Comments
4 min read
Automating Solidity Smart Contract Security on Windows and Linux

Automating Solidity Smart Contract Security on Windows and Linux

Comments
2 min read
7 Things You Must Do After Installing SafeLine

7 Things You Must Do After Installing SafeLine

5
Comments
2 min read
Building a Secure AWS Environment: Real Threats, Real Fixes

Building a Secure AWS Environment: Real Threats, Real Fixes

Comments
3 min read
Equipment Management, Visualization And How They Interact in Network Security

Equipment Management, Visualization And How They Interact in Network Security

Comments
5 min read
Verified Mark Certificate Guide

Verified Mark Certificate Guide

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.