From DevSecOps to Engineering Excellence
As I sit here, sipping my third cup of coffee and staring at the blinking cursor, I can't
Sentinel: Hackers Trail | Chapter teasers
Every chapter of the book includes a Limerick, Naani Poem, Quatrain, or Proverb - at the start, can you decipher the story from them?
Understanding Digital Signatures: More Than Just a Hash
Digital signatures are a cornerstone of modern security practices, ensuring data integrity and authentication in various online communications. But there&
Why PASETO Might Not Be the JWT Replacement We Hoped For
PASETO, a potential alternative to JWT, has sparked conversations within the security and developer community alike (for once).
While PASETO
Unveiling the Myths of Multi-Factor Authentication
MFA refresher
Multi-Factor Authentication (MFA) is a security practice that requires users to provide two or more distinct authentication factors
Unlocking Your Tech Success - 5 Essential Lessons
Ever wondered what it takes to thrive in the tech world, not just as a coder but as a tech-savvy
Forget DevSecOps and ShiftLeft
🪄Integrating Security Seamlessly
In this article, we're about to spill the beans on why this approach rocks, answer
Hawk Authentication bug - Firefox Accounts payload bypassing integrity validation
HawkAuth protocol is widely adopted by Firefox Accounts and appears in Postman in a very short list of supported API
The Imperative of Persistent CSRF Tokens (Video)
A brief on Cross-Site Request Forgery
Cross-Site Request Forgery (CSRF) attacks, capable of duping a user into performing an unintended
JWT: A Cryptographic Love Story with Security, Vulnerabilities, and a State of Confusion
Folks, remember to be careful with your JWTs. Use strong cryptographic algorithms, manage those secret keys like they're