Atomic Object Show Nav
Close Menu
< Blog Home
Atomic Object
  • AI Software Development
  • New Product Development
  • Product Enhancement
  • Product Modernization
  • Web App
  • Mobile App
  • IoT Software
  • Desktop App
  • Cloud
  • Agriculture
  • Automotive
  • Education
  • Entertainment
  • Financial Services
  • Government
  • Healthcare
  • Insurance
  • Logistics
  • Manufacturing
  • Retail
  • Utilities
Portfolio
Team
Culture
Contact
We're Hiring
Atomic Object Atomic Object
Services
  • Offerings
  • AI Software Development
  • New Product Development
  • Product Enhancement
  • Product Modernization
  • Platforms
  • Web App
  • Mobile App
  • IoT Software
  • Desktop App
  • Cloud
  • Industries
  • Agriculture
  • Automotive
  • Education
  • Entertainment
  • Financial Services
  • Government
  • Healthcare
  • Insurance
  • Logistics
  • Manufacturing
  • Retail
  • Utilities
Portfolio
Team
Culture
We're Hiring
Blog
Contact
Atomic Object
Services
Portfolio
Team
Culture
We're Hiring
Blog
Contact
← Back to Blog Home

security

Development Practices

Encryption for Your App – Best Practices for Getting Started

Adding security or encryption to a project can be daunting. It's tough even to know where to start. Here are a few things to keep in mind.
Development Practices

3 Simple Security Tips for Your Web App

After working on a security-focused software development project for a while, I’ve learned quite a bit and will share some security tips.
Development Practices

Think Like a Hacker: Pitfalls to Avoid When Writing an API

Learn how to secure your API by thinking like a hacker. Discover best practices for writing an API and protecting it from potential attacks.
Technical Practices

Passkeys and the Future of Web Authentication

Secure the access of your accounts with new authentication practices – discover the innovative tool of passkeys and asymmetric encryption.
Developer Tools

Use Docker Scout to Identify Security Vulnerabilities

Scout is a great new tool for identifying security vulnerabilities in Docker images. Here are a few of the ways you can use it.
Personal Optimization

Free Ways to Protect Your Personal Data on the Web

It can be hard for the average person to track and prevent personal data breaches. I’ll share with you some of the best ways to protect your data online.
Development

How to Add Basic Security Checks to Your Application

Develop a basic understanding of common security concerns, and you can be confident that you're not exposing your application to attacks.
Developer Tools

Securing an API Gateway Using AWS IAM

For user access, AWS Cognito is a good choice for authentication and authorization. But when only machines are involved, AWS IAM may be a better fit.
DevOps & System Admin.

Attach Elastic Beanstalk to a Route 53 Subdomain Securely with ACM

Here are the steps to attach a subdomain in Route 53 to an Elastic Beanstalk load balancer with an SSL certificate for secure connections.
DevOps & System Admin.

Securely Erase Hard Drives in 6 Easy Steps with nwipe

After using nwipe, you can rest assured that when you recycle your hard drive, no data will be made available to anyone else.
Software Science

Learn the Fascinating History and Uses of the Public Suffix List

The Public Suffix List is a piece of modern browser security comprised of a simple text file stored in a public repository, operated by volunteers.
Personal Optimization

Send Secure Emails with Gmail’s Confidential Mode

Banks won't be using it any time soon, but for the average user, Gmail's confidential mode is a very secure way to send private information.

Posts navigation

← Older posts

Want to see what Atomic can do?

Check out some of our work

Atomic's Portfolio

Atomic is a software design + development consultancy.

© 2025 Atomic Object LLC
Explore
  • Careers
  • Diversity
  • Resources
  • Atomic Blog
  • Developer Resources
  • Client Resources
Offices
  • Grand Rapids
  • Ann Arbor
  • Chicago
  • Raleigh-Durham
Details
  • Contact
  • Media
  • Privacy Policy
Certified B Corporation