Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Myth-Tech Security Framework Series' Articles
Back to Narnaiezzsshaa Truong's Series
Teaching OWASP Top 10 Through Visual Frameworks
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 24 '25
Teaching OWASP Top 10 Through Visual Frameworks
#
security
#
owasp
#
cybersecurity
#
education
Comments
Add Comment
16 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 27 '25
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure
#
cybersecurity
#
owasp
#
securityeducation
#
threatmodeling
3
reactions
Comments
Add Comment
9 min read
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 27 '25
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology
#
cybersecurity
#
threathunting
#
ai
#
securityeducation
2
reactions
Comments
Add Comment
8 min read
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 28 '25
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence
#
cybersecurity
#
zerotrust
#
authentication
#
mythology
Comments
Add Comment
3 min read
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 28 '25
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity
#
cybersecurity
#
apt
#
securityarchitecture
#
threatdetection
Comments
Add Comment
7 min read
The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 28 '25
The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity
#
cybersecurity
#
leadership
#
governance
#
mythology
Comments
Add Comment
3 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Nov 21 '25
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
#
threathunting
#
devops
#
security
#
infosec
6
reactions
Comments
2
comments
4 min read
The Labors of Heracles as Risk Management for SMBs
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Jan 6
The Labors of Heracles as Risk Management for SMBs
#
security
#
riskmanagement
#
smb
#
python
Comments
Add Comment
3 min read
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account