DEV Community

Schwarzwaldschatten: A Security Advent Story Series' Articles

Back to Mohammad-Ali A'RÂBI's Series
Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)
Cover image for Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)

Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)

6
Comments
2 min read
Day 2 — Phishing & Identity Verification (The Typed Letter)
Cover image for Day 2 — Phishing & Identity Verification (The Typed Letter)

Day 2 — Phishing & Identity Verification (The Typed Letter)

6
Comments
2 min read
Day 3 — Trusted Supply Chain (Through the Gate)
Cover image for Day 3 — Trusted Supply Chain (Through the Gate)

Day 3 — Trusted Supply Chain (Through the Gate)

8
Comments
1 min read
Day 4 — Continuous Monitoring (Midnight Vigil)
Cover image for Day 4 — Continuous Monitoring (Midnight Vigil)

Day 4 — Continuous Monitoring (Midnight Vigil)

8
Comments
1 min read
Day 5 — Environment Drift (The Fog in the Valley)
Cover image for Day 5 — Environment Drift (The Fog in the Valley)

Day 5 — Environment Drift (The Fog in the Valley)

8
Comments
2 min read
Day 6 — Image Hardening (The Audit)
Cover image for Day 6 — Image Hardening (The Audit)

Day 6 — Image Hardening (The Audit)

3
Comments
3 min read
# Day 7 — Patch & Tool Maintenance (Deeper into the Forest)
Cover image for # Day 7 — Patch & Tool Maintenance (Deeper into the Forest)

# Day 7 — Patch & Tool Maintenance (Deeper into the Forest)

Comments
2 min read
Day 8 — Threat Validation (The Girl in the Red Cloak)
Cover image for Day 8 — Threat Validation (The Girl in the Red Cloak)

Day 8 — Threat Validation (The Girl in the Red Cloak)

3
Comments
2 min read
Day 9 — Runtime Threat Detection (The Shadow with Red Eyes)
Cover image for Day 9 — Runtime Threat Detection (The Shadow with Red Eyes)

Day 9 — Runtime Threat Detection (The Shadow with Red Eyes)

3
Comments 1
3 min read
Day 10 — Legacy Systems (The Old Bridge)
Cover image for Day 10 — Legacy Systems (The Old Bridge)

Day 10 — Legacy Systems (The Old Bridge)

4
Comments
2 min read
Day 11 — Authenticity of AI-Generated Content (The Cowgirl)
Cover image for Day 11 — Authenticity of AI-Generated Content (The Cowgirl)

Day 11 — Authenticity of AI-Generated Content (The Cowgirl)

3
Comments
2 min read
Day 12 — React2Shell CVE (The Mines)
Cover image for Day 12 — React2Shell CVE (The Mines)

Day 12 — React2Shell CVE (The Mines)

Comments
2 min read
Day 13 — Audit and Update Old Infrastructure (Deep in the Mines)
Cover image for Day 13 — Audit and Update Old Infrastructure (Deep in the Mines)

Day 13 — Audit and Update Old Infrastructure (Deep in the Mines)

Comments
2 min read