DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Future of Cybersecurity Jobs: What’s Thriving, Evolving, and Disappearing by 2030

The Future of Cybersecurity Jobs: What’s Thriving, Evolving, and Disappearing by 2030

1
Comments 3
4 min read
Top Cybersecurity Companies: How They Keep You Safe Online

Top Cybersecurity Companies: How They Keep You Safe Online

Comments
5 min read
Why AI Apps Need Security from Day One | AI Security series

Why AI Apps Need Security from Day One | AI Security series

1
Comments
3 min read
What Exactly is a JWT and How Does it Work?

What Exactly is a JWT and How Does it Work?

Comments
4 min read
AI Hallucinations: Can We Trust AI-Generated Data?

AI Hallucinations: Can We Trust AI-Generated Data?

5
Comments 1
1 min read
Why Does Your Business Need a Cloud Native Security Platform?

Why Does Your Business Need a Cloud Native Security Platform?

Comments 1
6 min read
Cybersecurity for Beginners: How to Get Started in 2025

Cybersecurity for Beginners: How to Get Started in 2025

3
Comments
3 min read
Security news weekly round-up - 30th May 2025

Security news weekly round-up - 30th May 2025

1
Comments
4 min read
Fortifying Your Aptos Assets: A Practical Guide to Key Account Rotation

Fortifying Your Aptos Assets: A Practical Guide to Key Account Rotation

Comments 1
9 min read
Cybersecurity: Yesterday, Today, and Forever

Cybersecurity: Yesterday, Today, and Forever

2
Comments 1
3 min read
Securing LLM Function-Calling: Risks & Mitigations for AI Agents

Securing LLM Function-Calling: Risks & Mitigations for AI Agents

8
Comments 1
17 min read
[SECURITY IN RAILS] Preventing enumeration attacks, data leaks, and timing based attacks 🔐🛤️

[SECURITY IN RAILS] Preventing enumeration attacks, data leaks, and timing based attacks 🔐🛤️

12
Comments 2
7 min read
The Hacker’s New Assistant: How AI is supercharging Cyber crime In 2025

The Hacker’s New Assistant: How AI is supercharging Cyber crime In 2025

Comments
8 min read
AWS WAF: A Comprehensive Guide to Web Application Protection

AWS WAF: A Comprehensive Guide to Web Application Protection

1
Comments 1
9 min read
🔐 AIsecTest Bridge: Building Trustworthy and Inclusive Digital Security with AWS

🔐 AIsecTest Bridge: Building Trustworthy and Inclusive Digital Security with AWS

Comments
2 min read
IT Hardware Asset Management Best Practices for Lifecycle Tracking

IT Hardware Asset Management Best Practices for Lifecycle Tracking

5
Comments
12 min read
You've leaked a secret in your git repository - now what?

You've leaked a secret in your git repository - now what?

1
Comments 2
12 min read
Which Authentication Method Would You Choose for Your Website in 2025?

Which Authentication Method Would You Choose for Your Website in 2025?

Comments
2 min read
DevOps Reimagined: From Jenkins to AIOps and the Rise of Intelligent Automation – Part II

DevOps Reimagined: From Jenkins to AIOps and the Rise of Intelligent Automation – Part II

Comments
3 min read
อุตสาหกรรมความปลอดภัยทางไซเบอร์ (Cybersecurity Industry)

อุตสาหกรรมความปลอดภัยทางไซเบอร์ (Cybersecurity Industry)

Comments 1
1 min read
GenAI's Ethical Imperative: Building Robust Data Governance Frameworks

GenAI's Ethical Imperative: Building Robust Data Governance Frameworks

Comments 1
6 min read
MongoDB Access Control: Creating Secure Users with Custom Roles

MongoDB Access Control: Creating Secure Users with Custom Roles

1
Comments 1
3 min read
Before You Trust Google Drive... Read This!

Before You Trust Google Drive... Read This!

1
Comments
4 min read
AuthSync – A Passwordless, Cross-Device Authentication System (Inspired by WhatsApp Web & FIDO2)

AuthSync – A Passwordless, Cross-Device Authentication System (Inspired by WhatsApp Web & FIDO2)

1
Comments 1
2 min read
Deepfakes Are the Next Cyber Weapon!

Deepfakes Are the Next Cyber Weapon!

1
Comments
4 min read
loading...