DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
FAQ: Agentic AI Security Threats — Your Top Questions Answered

FAQ: Agentic AI Security Threats — Your Top Questions Answered

Comments
4 min read
Synthetic Identity Fraud: The $5B Shadow Economy You Can't See

Synthetic Identity Fraud: The $5B Shadow Economy You Can't See

Comments
6 min read
Why You Need MCP Governance (And Why Observability Isn't the Same Thing)

Why You Need MCP Governance (And Why Observability Isn't the Same Thing)

Comments
7 min read
FAQ: Synthetic Identity Fraud Detection and Prevention

FAQ: Synthetic Identity Fraud Detection and Prevention

Comments
5 min read
LangChain load() is basically eval()

LangChain load() is basically eval()

Comments
1 min read
Why I Built a Password Manager That Never Touches the Internet

Why I Built a Password Manager That Never Touches the Internet

Comments 1
3 min read
FAQ: Deepfake-as-a-Service (DaaS) Detection and Defense

FAQ: Deepfake-as-a-Service (DaaS) Detection and Defense

Comments
3 min read
FAQ: Stolen Valid Credentials — How Attackers Move Through Your Infrastructure Undetected

FAQ: Stolen Valid Credentials — How Attackers Move Through Your Infrastructure Undetected

1
Comments
8 min read
Stolen Valid Credentials: The New Attack Vector Bypassing All Your Defenses

Stolen Valid Credentials: The New Attack Vector Bypassing All Your Defenses

1
Comments
10 min read
Zero-Trust at the Edge: Rethinking the eDMZ Perimeter (Part 1)

Zero-Trust at the Edge: Rethinking the eDMZ Perimeter (Part 1)

Comments
6 min read
Kure Monitor

Kure Monitor

Comments
2 min read
Cloud Misconfiguration Cascade — How 60% of Breaches Start

Cloud Misconfiguration Cascade — How 60% of Breaches Start

Comments
5 min read
The Keys-In-GitHub Crisis — How Leaked API Credentials Compromise Your Infrastructure

The Keys-In-GitHub Crisis — How Leaked API Credentials Compromise Your Infrastructure

Comments
6 min read
Harvest Now, Decrypt Later: Why Nation States Are Stealing Your Encrypted Data Today

Harvest Now, Decrypt Later: Why Nation States Are Stealing Your Encrypted Data Today

Comments
9 min read
How to Detect VPN and Proxy Users

How to Detect VPN and Proxy Users

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.