Development Practices Think Like a Hacker: Pitfalls to Avoid When Writing an API Learn how to secure your API by thinking like a hacker. Discover best practices for writing an API and protecting it from potential attacks.
Technical Practices Passkeys and the Future of Web Authentication Secure the access of your accounts with new authentication practices – discover the innovative tool of passkeys and asymmetric encryption.
Developer Tools Use Docker Scout to Identify Security Vulnerabilities Scout is a great new tool for identifying security vulnerabilities in Docker images. Here are a few of the ways you can use it.
Personal Optimization Free Ways to Protect Your Personal Data on the Web It can be hard for the average person to track and prevent personal data breaches. I’ll share with you some of the best ways to protect your data online.
Development How to Add Basic Security Checks to Your Application Develop a basic understanding of common security concerns, and you can be confident that you're not exposing your application to attacks.
Developer Tools Securing an API Gateway Using AWS IAM For user access, AWS Cognito is a good choice for authentication and authorization. But when only machines are involved, AWS IAM may be a better fit.
DevOps & System Admin. Attach Elastic Beanstalk to a Route 53 Subdomain Securely with ACM Here are the steps to attach a subdomain in Route 53 to an Elastic Beanstalk load balancer with an SSL certificate for secure connections.
DevOps & System Admin. Securely Erase Hard Drives in 6 Easy Steps with nwipe After using nwipe, you can rest assured that when you recycle your hard drive, no data will be made available to anyone else.
Software Science Learn the Fascinating History and Uses of the Public Suffix List The Public Suffix List is a piece of modern browser security comprised of a simple text file stored in a public repository, operated by volunteers.
Personal Optimization Send Secure Emails with Gmail’s Confidential Mode Banks won't be using it any time soon, but for the average user, Gmail's confidential mode is a very secure way to send private information.
Development You Should Be Using a Reentrancy Guard in Your Smart Contracts A reentrancy guard prevents more than one function from being executed at a time and eliminates the possibility of exploiting a recursive call.
Evolving the Industry Not Your Keys, Not Your Crypto It's important to learn how to properly store your cryptocurrencies. Here is a helpful guide to secure your assets for years to come.