The last two weeks have been a bit of a roller coaster ride for me.

I started off by getting the news that my application to the University of Waterloo’s Masters in Computer Science program was rejected, which had me feeling pretty down. Then I got some good news abo ...

Continue Reading
  This course will be offered virtually via Zoom This is a fully hands-on practical concentrated course on securing and attacking web and cloud APIs.

APIs are everywhere nowadays: In web apps, embedded systems, enterprise apps, cloud environments and even IoT, and it is becoming increasingly necessary to learn how to defend, secure and attack API i ...

Continue Reading
The Internet of Things (IoT) is a network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators and connectivity which enables these things to connect and exchange data.

IoT requires inter-networking infrastructure as well as endpoints – the objects or ‘things’ themselves. The estimated value of IoT will be $7 trillion by 2020. The Industrial Internet refers to th ...

Continue Reading
API keys are passwords, so protect them like you would any other password.

3. Use API Gateways to Monitor and Control Access Most organizations have a variety of APIs that they use for different purposes. Some may be used by customers or partners while others are intended f ...

Continue Reading
I’m a huge fan of the new iPad Pro.

It’s my favorite computer ever, and I use it every day for work and play. The New iPad Pro is Awesome https://t.co/r0dxQmxSiv ...

Continue Reading
I’m a big fan of the book, but I think it could have been better.

The Good: I really liked how the author approached this subject matter. It was very well researched and he did an excellent job at explaining his reasoning for why he believes what he does. He also p ...

Continue Reading
APIs are a security risk, and organizations need to adopt a zero-trust approach.

APIs are an attack vector that is growing in popularity among cybercriminals. The Forrester report shows how API insecurity can lead to breaches of sensitive data or even entire systems. As APIs becom ...

Continue Reading
ZTA is a new approach to API security that aims to protect your APIs from all angles.

It's based on the idea of limiting trust in incoming traffic and verifying everything, including JWTs. 5. Keep Your Code Up-to-Date With Security Patches This one should be obvious, but it isn't alw ...

Continue Reading

Back to Main

Subscribe for the latest news: