A comprehensive developer guide to implementing secure authentication in modern applications. Covers OAuth 2.0, OIDC, ...
Given my experience with building and managing security programs at fast-growing, successful startups, I am often asked how to "bootstrap" security programs. Investing in people and tools You can't ...
Security vulnerabilities in the application programming interfaces (APIs) powering modern digital services and applications have emerged as a major threat to enterprise systems and data. A recent ...
With the proliferation of mobile apps, their security becomes critical: apps store and transmit a lot of sensitive user data. This data can be vulnerable due to weak encryption, insecure storage, and ...
The concept of containerization has changed how applications are deployed and managed, offering flexibility and scalability. These changes have made compliance with security standards in containerized ...
The digital realm in 2024 is more connected than ever before, but with that connectivity comes increased risk. Cyberattacks are becoming more sophisticated, targeting vulnerabilities in web ...
Zero trust has become a key strategy for protecting small businesses’ sensitive data. With cyberthreats constantly increasing in numbers and threats, it is essential to reduce the risks. However, the ...
In an age of zero-trust security, enterprises are looking to secure individual virtual machines (VMs) in their on-premise data centres, cloud or hybrid environments to prevent increasingly ...
Product security teams are becoming more popular for the in-depth security approach they take when compared to appsec teams. But there is more to it, which includes creating a security-conscious ...
2023 was an eventful year for cloud security. We saw multiple high-profile incidents, such as the discovery of a far-reaching zero-day vulnerability in the MOVEit file transfer server application and ...