DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introducing SysBrain: A Cognitive Automation Framework for Windows Power Users”

Introducing SysBrain: A Cognitive Automation Framework for Windows Power Users”

Comments
1 min read
 🦀 Rust Weekly Log — This Week’s Progress

 🦀 Rust Weekly Log — This Week’s Progress

Comments
1 min read
How Wallet-as-a-Service Can Save Your Crypto Startup from Infrastructure Headaches

How Wallet-as-a-Service Can Save Your Crypto Startup from Infrastructure Headaches

4
Comments 1
3 min read
Why DevSecOps Isn't a Role. It's a Responsibility

Why DevSecOps Isn't a Role. It's a Responsibility

1
Comments
4 min read
SecureBitchat — Fast, Encrypted P2P Calls in Your Browser

SecureBitchat — Fast, Encrypted P2P Calls in Your Browser

Comments
1 min read
Bracing for Breakers: Quantum-Safe Crypto for the Real World

Bracing for Breakers: Quantum-Safe Crypto for the Real World

Comments
2 min read
Can We Really Trust AI? Lies, Poison, and the Need for Responsible AI

Can We Really Trust AI? Lies, Poison, and the Need for Responsible AI

14
Comments 6
3 min read
WooCommerce + JWT = 🔥 Cookies rejected, sessions lost - here’s why it happens

WooCommerce + JWT = 🔥 Cookies rejected, sessions lost - here’s why it happens

Comments
2 min read
MCUBoot: Firmware Signing and Header Analysis

MCUBoot: Firmware Signing and Header Analysis

Comments 1
3 min read
Enhancing Account Security in Microsoft Entra ID: Password Protection and Self-Service Reset

Enhancing Account Security in Microsoft Entra ID: Password Protection and Self-Service Reset

6
Comments 1
3 min read
Υλοποίηση controllers και προσθήκη JWT και swagger

Υλοποίηση controllers και προσθήκη JWT και swagger

Comments
2 min read
Beyond API Keys: Token Exchange, Identity Federation & MCP Servers

Beyond API Keys: Token Exchange, Identity Federation & MCP Servers

7
Comments
5 min read
What Happens if We Get Hacked? A Transparent Look at the Musical Chairs Security Model

What Happens if We Get Hacked? A Transparent Look at the Musical Chairs Security Model

Comments
6 min read
Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

6
Comments 1
5 min read
How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

4
Comments
5 min read
7 Tips for Hardening TLS on Nginx for Secure Web Traffic and Performance

7 Tips for Hardening TLS on Nginx for Secure Web Traffic and Performance

Comments
3 min read
How to use JWTokens properly

How to use JWTokens properly

Comments
3 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

6
Comments 5
6 min read
7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

Comments
4 min read
Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

1
Comments
3 min read
After 20 Years in Technology, AI is the First Thing That Actually Changed How I Work

After 20 Years in Technology, AI is the First Thing That Actually Changed How I Work

1
Comments
9 min read
Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Comments
2 min read
Generate Strong, Reproducible Passwords with Patterns & Grids

Generate Strong, Reproducible Passwords with Patterns & Grids

Comments
1 min read
Improving Binary Security in Mobile Application: A Deep Dive into Obfuscation

Improving Binary Security in Mobile Application: A Deep Dive into Obfuscation

Comments
5 min read
loading...