DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unkey vs Zuplo: The API Security Showdown That Matters

Unkey vs Zuplo: The API Security Showdown That Matters

2
Comments
7 min read
Securing the Cloud: A Focused Overview of Microsoft Azure Security Features

Securing the Cloud: A Focused Overview of Microsoft Azure Security Features

1
Comments
1 min read
AI-Powered Ghosts: Securing Your Smart Factory's IP

AI-Powered Ghosts: Securing Your Smart Factory's IP

5
Comments
2 min read
Unlocking Trustworthy AI: Verifiable Fine-Tuning with Zero-Knowledge Proofs

Unlocking Trustworthy AI: Verifiable Fine-Tuning with Zero-Knowledge Proofs

1
Comments
2 min read
Fort Knox for Factories: AI-Powered Watermarks for Industrial Control Code by Arvind Sundararajan

Fort Knox for Factories: AI-Powered Watermarks for Industrial Control Code by Arvind Sundararajan

1
Comments
2 min read
When Your API Gateway Becomes Your Microservices’ Achilles’ Heel

When Your API Gateway Becomes Your Microservices’ Achilles’ Heel

3
Comments
5 min read
💎 ANN: oauth2 v2.0.16 w/ full E2E example (& Instagram Compat)

💎 ANN: oauth2 v2.0.16 w/ full E2E example (& Instagram Compat)

2
Comments
5 min read
Modern Secret Management: 5 New Vault Solutions for Secure Credential Storage That Actually Work in Production

Modern Secret Management: 5 New Vault Solutions for Secure Credential Storage That Actually Work in Production

2
Comments
9 min read
Top 15 Kubernetes Security Tools and Solutions

Top 15 Kubernetes Security Tools and Solutions

1
Comments
13 min read
Ghost in the Machine: Securing Industrial Control Systems with Adaptive Watermarks by Arvind Sundararajan

Ghost in the Machine: Securing Industrial Control Systems with Adaptive Watermarks by Arvind Sundararajan

1
Comments
1 min read
The Invisible Guardian: Securing Industrial Machine Tools with AI-Powered Adaptive Watermarks

The Invisible Guardian: Securing Industrial Machine Tools with AI-Powered Adaptive Watermarks

1
Comments
2 min read
Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Comments
3 min read
Outil de Cybersécurité du Jour - Sep 2, 2025

Outil de Cybersécurité du Jour - Sep 2, 2025

5
Comments
2 min read
DNS: O que é, como funciona e como a Cloudflare pode tornar sua navegação mais segura

DNS: O que é, como funciona e como a Cloudflare pode tornar sua navegação mais segura

Comments
3 min read
The Invisible Shield: AI-Powered Watermarks Protecting Industrial Machines

The Invisible Shield: AI-Powered Watermarks Protecting Industrial Machines

1
Comments
2 min read
Tracking outbound API calls from your application: why, what worked (and what didn’t)

Tracking outbound API calls from your application: why, what worked (and what didn’t)

Comments
3 min read
Set Up SSH Keys on Windows: A Step-by-Step Guide

Set Up SSH Keys on Windows: A Step-by-Step Guide

4
Comments
3 min read
From Kashmir to the World: Launching the Universal DID-Native Addressing (UDNA) Community Group at W3C

From Kashmir to the World: Launching the Universal DID-Native Addressing (UDNA) Community Group at W3C

Comments
2 min read
Authenticate GitLab Pipelines to AWS with OIDC (No Static Keys 🚀)

Authenticate GitLab Pipelines to AWS with OIDC (No Static Keys 🚀)

Comments
2 min read
Building a Cost-Efficient Game Launcher with AWS Pre-Signed URLs

Building a Cost-Efficient Game Launcher with AWS Pre-Signed URLs

4
Comments 1
5 min read
What are Docker Hardened Images and what problem does it solve?

What are Docker Hardened Images and what problem does it solve?

2
Comments
4 min read
OneTerm: The Open-Source Bastion Host I Refactored in Three Months

OneTerm: The Open-Source Bastion Host I Refactored in Three Months

3
Comments
3 min read
Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

Comments
3 min read
Why did we disable CSRF protection?

Why did we disable CSRF protection?

Comments
3 min read
How SSH Authentication Really Works

How SSH Authentication Really Works

11
Comments
3 min read
loading...