ZTA is a new approach to API security that aims to protect your APIs from all angles.

It's based on the idea of limiting trust in incoming traffic and verifying everything, including JWTs. 5. Keep Your Code Up-to-Date With Security Patches This one should be obvious, but it isn't alw ...

Continue Reading
API security is under scrutiny as businesses digitally transform, and startup vendors are emerging with fresh approaches for secure cloud computing.

Houwzer Inc., a real estate brokerage, title and mortgage services firm in Philadelphia, is a relatively small company with 150 employees, but it has conducted $1 billion in real estate transactions s ...

Continue Reading
I’m going to be working on a new project called “Ember for Rails”, which will allow developers to use Ember.

js in their Rails apps with as little friction as possible. I am very excited to announce that I have joined the team at Discourse (the best place online) and will be working on an exciting new open ...

Continue Reading
The “new” version of the game is a complete and utter failure.

It has been made by people who have no idea what they are doing, it has been tested by even less people, and it was released to the public without any warning whatsoever. The new release is not only c ...

Continue Reading
I’m a freelance writer and editor with 20 years of experience in technology journalism.

I've written for CNET, TechRepublic, ZDNet, PCMag, InfoWorld, eWeek, CSO Online... Dark Reading is the place to be these days if you're interested in cybersecurity. It's where all the big players go ...

Continue Reading
The first thing you need to know is that the term “sperm” refers to a lot more than just sperm.

It also includes other male reproductive cells, like spermatids and spermatozoa (the mature form of spermatids). Sperm are produced in the testes, which are located inside the scrotum on either side o ...

Continue Reading
I’m a security engineer at Google, and I work on the Android Security team.

My name is Scott Roberts, and I will be presenting "Preventing Common OWASP API Security Risks" at AppSec USA in San Francisco this year. This talk will focus on common mistakes that developers make w ...

Continue Reading
Verifiable credentials: Verifiable credentials are a way to prove your identity online.

They’re like an ID card or driver’s license, but they can be used anywhere on the internet. You can use them to log into websites and apps, send money online, make purchases with cryptocurrencies, a ...

Continue Reading

Back to Main

Subscribe for the latest news: