Stof

Stof

Jul
07
From DevSecOps to Engineering Excellence

From DevSecOps to Engineering Excellence

As I sit here, sipping my third cup of coffee and staring at the blinking cursor, I can't
8 min read
Apr
22
Sentinel: Hackers Trail | Chapter teasers

Sentinel: Hackers Trail | Chapter teasers

Every chapter of the book includes a Limerick, Naani Poem, Quatrain, or Proverb - at the start, can you decipher the story from them?
4 min read
Oct
23
Understanding Digital Signatures: More Than Just a Hash

Understanding Digital Signatures: More Than Just a Hash

Digital signatures are a cornerstone of modern security practices, ensuring data integrity and authentication in various online communications. But there&
6 min read
Oct
04
Why PASETO Might Not Be the JWT Replacement We Hoped For

Why PASETO Might Not Be the JWT Replacement We Hoped For

PASETO, a potential alternative to JWT, has sparked conversations within the security and developer community alike (for once). While PASETO
3 min read
Sep
05
Unveiling the Myths of Multi-Factor Authentication

Unveiling the Myths of Multi-Factor Authentication

MFA refresher Multi-Factor Authentication (MFA) is a security practice that requires users to provide two or more distinct authentication factors
9 min read
Sep
01
Unlocking Your Tech Success - 5 Essential Lessons

Unlocking Your Tech Success - 5 Essential Lessons

Ever wondered what it takes to thrive in the tech world, not just as a coder but as a tech-savvy
2 min read
Aug
24
Forget DevSecOps and ShiftLeft

Forget DevSecOps and ShiftLeft

🪄Integrating Security Seamlessly In this article, we're about to spill the beans on why this approach rocks, answer
4 min read
May
31
Hawk Authentication bug - Firefox Accounts payload bypassing integrity validation

Hawk Authentication bug - Firefox Accounts payload bypassing integrity validation

HawkAuth protocol is widely adopted by Firefox Accounts and appears in Postman in a very short list of supported API
9 min read
May
25

The Imperative of Persistent CSRF Tokens (Video)

A brief on Cross-Site Request Forgery Cross-Site Request Forgery (CSRF) attacks, capable of duping a user into performing an unintended
5 min read
Apr
06

JWT: A Cryptographic Love Story with Security, Vulnerabilities, and a State of Confusion

Folks, remember to be careful with your JWTs. Use strong cryptographic algorithms, manage those secret keys like they're
15 min read