Deloitte is hiring a Cyber Risk Analyst to work in our Baltimore, MD office.

The job description for this position can be found here: https://www2.deloitte.com/us/en/pages/careers/job-opportunities/associate-information-security-analyst-.html .  If you are interested in applyi ...

Continue Reading
I have a new job! I’m working for the same company as my friend and former coworker, but in a different department.

My new title is “Software Engineer II” (which sounds like it should be an upgrade from Software Engineer I, but isn’t). The pay increase was pretty significant — $10k/year more than what I was mak ...

Continue Reading
The EO is a good start, but it’s not enough.

The private sector should also be implementing these same principles and practices to ensure secure software supply chains and API security across the board. What Does the Biden Administration’s Cyb ...

Continue Reading
I’m not a fan of the new design.

The first thing you notice is that it looks like an app designed for iOS 7, rather than an OS X app. The old version was very clearly OS X-y and had some nice touches like using the system font and ha ...

Continue Reading
Salt Security is a cloud-based API security platform that allows enterprises to protect their APIs from attacks

Salt Security is a cloud-based API security platform that allows enterprises to protect their APIs from attacks https://t.co/m4JpVEZU9W ...

Continue Reading
I was able to get a free ride on the NYC subway by using an API.

I've been working with APIs for about 2 years now, and I love them. They're easy to use, they make my life easier when it comes to writing code, and they allow me to do things that were otherwise impo ...

Continue Reading
The best way to avoid the problem is to use a static analysis tool that can detect this.

If you don’t have one, then make sure your code doesn’t do anything like this: if (p https://t.co/8IywWh2NhU ...

Continue Reading
ZTA and ZTNA are not mutually exclusive.

They can be used together to provide a comprehensive security posture for an organization’s computing environment. Why “zero trust” is a myth in API security The term zero trust has become overlo ...

Continue Reading

Back to Main

Subscribe for the latest news: