How to encrypt data easily when your apps and databases are already running
Why should I care about SBOMs as a Software Developer ...
HTML5 required and pattern are not a security feature
How to Create and Configure Your Kubernetes Service Account
Reading saved firefox passwords via cli and other woes
The risks of using vulnerable dependencies in your project, and how SCA helps manage them
10 best practices to containerize Node.js web applications with Docker
Spin up secure HTTPS proxy in less than 10 minutes
26 best practices to secure your cloud environment☁️🔥
How to log in to multiple AWS accounts — the easy way
26 AWS Security Best Practices to Adopt in Production
You Shall Not Pass: The Ins and Outs of Authentication
OWAST Top 10 vulnerabilities and how to approach them
Fixing potential security issues in your Infrastructure as Code at the source with Sysdig
Top 7 Authentication Providers for Building Apps With JWT (2022)
Appwrite Loves Open Source: Why I Chose To Sponsor Offen
AWS VPN: Avoid a large surprise bill by using this cost calculator.
Using Cognito groups to control access to API endpoints
Thinking Like a Hacker: Abusing Stolen Private Keys
file validation in python Much easier and more reliable
Subscribe to a new newsletter for security-aware developers!
Using Python to Flood Scammers with Fake Passwords
What's The Name of This Password Management Technique and is it a Good Idea?
Admission Controllers in Action: Datree's Approach
Speaker Free Pass Giveaway - DeveloperWeek Cloud 2022 (Sept 7-14)
How I found an S3 vulnerability in a $85 million funded startup and reported it ethically
What is Authorization service and why does it matter?