Learn about API vulnerability in Safari 15 leaking user info, vulnerabilities in AWS, and a podcast with Rinki Sethi and Alissa Knight discussing API security. Read all
When an organization implements the DevSecOps model, it provides the operations and development teams with tools and processes to help them make security decisions. Read all
API misconfigurations and the attacks they attract occur more regularly than you might anticipate. Strengthen your API security using these best practices. Read all
With more devices entering our homes and workplaces, implementing and updating security measures should be a top priority for the coming years in IoT. Read all
This blog will explore both traditional methods (using jar) and modern methods (using secure property generator) of generating secure properties in Mule 4. Read all
The recent WannaCry attacks have made the need for basic security compliance glaringly obvious. Read on for some practical tips on how to avoid hackers. Read all
This introduction combines best practices from the CNCF, NSA, and CISA to help organizations mitigate risks and adopt a multi-layered security approach. Read all
Dependencies cause chaos on delivery and destroy predictability. In this article, I'll share some tips for product engineering teams to avoid dependencies. Read all
As the media industry joins others by adopting AI to improve user experience, many developers are facing new challenges and higher stakes on the backend. Read all