DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Adaptive Radios: Teaching Machines to Outsmart Signal Jammers

Adaptive Radios: Teaching Machines to Outsmart Signal Jammers

Comments 2
2 min read
Authenticate GitLab Pipelines to AWS with OIDC (No Static Keys 🚀)

Authenticate GitLab Pipelines to AWS with OIDC (No Static Keys 🚀)

Comments
2 min read
From Kashmir to the World: Launching the Universal DID-Native Addressing (UDNA) Community Group at W3C

From Kashmir to the World: Launching the Universal DID-Native Addressing (UDNA) Community Group at W3C

Comments
2 min read
Why did we disable CSRF protection?

Why did we disable CSRF protection?

Comments
3 min read
Webauthn authentication with React and Nest.js

Webauthn authentication with React and Nest.js

2
Comments
13 min read
Episode 1: Hunting Deprecated Lambda Runtimes — Before They Become Problems

Episode 1: Hunting Deprecated Lambda Runtimes — Before They Become Problems

Comments
6 min read
AWS Security & Cost Optimization Arsenal: From CLI to Lambda Automation

AWS Security & Cost Optimization Arsenal: From CLI to Lambda Automation

Comments
3 min read
Invisible Ink for AI: Proof of Creation in a Generative World

Invisible Ink for AI: Proof of Creation in a Generative World

Comments
2 min read
MDM Software Functionalities That Improve IT Security

MDM Software Functionalities That Improve IT Security

Comments
4 min read
Outil de Cybersécurité du Jour - Sep 1, 2025

Outil de Cybersécurité du Jour - Sep 1, 2025

1
Comments
3 min read
Why does big tech not run Accessibility bug bounties?

Why does big tech not run Accessibility bug bounties?

2
Comments 3
3 min read
Authentication and authorization : difference

Authentication and authorization : difference

Comments
2 min read
Kinde new features in August

Kinde new features in August

1
Comments
1 min read
Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Comments
2 min read
Docker Series: Episode 23 — Docker Swarm Advanced: Services, Secrets & Configs 🔐

Docker Series: Episode 23 — Docker Swarm Advanced: Services, Secrets & Configs 🔐

7
Comments
2 min read
Adaptive Shields: AI's Counterpunch to Smart Jamming

Adaptive Shields: AI's Counterpunch to Smart Jamming

Comments
2 min read
Security news weekly round-up - 3rd October 2025

Security news weekly round-up - 3rd October 2025

2
Comments
3 min read
🌍 The Dark Side of Connectivity in a Digital Age

🌍 The Dark Side of Connectivity in a Digital Age

Comments
2 min read
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

Comments
2 min read
Secure SSH Shell Applications

Secure SSH Shell Applications

1
Comments
4 min read
Smart Spectrum: AI's Counterpunch to Wireless Interference by Arvind Sundararajan

Smart Spectrum: AI's Counterpunch to Wireless Interference by Arvind Sundararajan

Comments
2 min read
Short-lived GitHub Access Token for secure local development by ghtkn

Short-lived GitHub Access Token for secure local development by ghtkn

1
Comments
3 min read
Private LLM Inference: Democratizing AI with Ciphertext Computations

Private LLM Inference: Democratizing AI with Ciphertext Computations

1
Comments
2 min read
Unlocking LLM Power: Secure and Cost-Effective Inference for Everyone by Arvind Sundararajan

Unlocking LLM Power: Secure and Cost-Effective Inference for Everyone by Arvind Sundararajan

1
Comments
2 min read
The Dark Reality of Open Source: Why Developers Must Rethink 'Free Software'

The Dark Reality of Open Source: Why Developers Must Rethink 'Free Software'

1
Comments
3 min read
loading...