Developer Tools Use Docker Scout to Identify Security Vulnerabilities Scout is a great new tool for identifying security vulnerabilities in Docker images. Here are a few of the ways you can use it.
Personal Optimization Free Ways to Protect Your Personal Data on the Web It can be hard for the average person to track and prevent personal data breaches. I’ll share with you some of the best ways to protect your data online.
Development How to Add Basic Security Checks to Your Application Develop a basic understanding of common security concerns, and you can be confident that you're not exposing your application to attacks.
Developer Tools Securing an API Gateway Using AWS IAM For user access, AWS Cognito is a good choice for authentication and authorization. But when only machines are involved, AWS IAM may be a better fit.
DevOps & System Admin. Attach Elastic Beanstalk to a Route 53 Subdomain Securely with ACM Here are the steps to attach a subdomain in Route 53 to an Elastic Beanstalk load balancer with an SSL certificate for secure connections.
DevOps & System Admin. Securely Erase Hard Drives in 6 Easy Steps with nwipe After using nwipe, you can rest assured that when you recycle your hard drive, no data will be made available to anyone else.
Software Science Learn the Fascinating History and Uses of the Public Suffix List The Public Suffix List is a piece of modern browser security comprised of a simple text file stored in a public repository, operated by volunteers.
Personal Optimization Send Secure Emails with Gmail’s Confidential Mode Banks won't be using it any time soon, but for the average user, Gmail's confidential mode is a very secure way to send private information.
Development You Should Be Using a Reentrancy Guard in Your Smart Contracts A reentrancy guard prevents more than one function from being executed at a time and eliminates the possibility of exploiting a recursive call.
Evolving the Industry Not Your Keys, Not Your Crypto It's important to learn how to properly store your cryptocurrencies. Here is a helpful guide to secure your assets for years to come.
DevOps & System Admin. How TOTP Systems Like Google Authenticator Work A history of the HOTP one-time password method, how the current TOTP system works, and a few risks inherent to the TOTP approach.
Personal Optimization Staying (Digitally) Safe During COVID-19 – Four Steps to Personal Cyber Security Cyber threats and scams have escalated during the COVID-19 pandemic. Here are are some tips and advice on what you can do to stay secure.