The CIS Controls were developed by The Center for Internet Security (CIS) as a framework for improving cybersecurity. The idea is that if you follow these 20 best practices, your organization will hav ...
Continue ReadingOctober 23, 2021
The example uses the following components: Identity Server - OpenID Connect server that issues access tokens and refresh tokens. This can be used as an OAuth2 Authorization Server or an OIDC Hybrid F ...
Continue ReadingOctober 23, 2021
I was lucky enough to get an invite from Apple to test out their new set top box, the 4th generation Apple TV. It is a small black square that looks like any other piece of home entertainment equipmen ...
Continue ReadingOctober 22, 2021
It can be used during security assignments https://t.co/H1y5EI93Du ...
Continue ReadingOctober 22, 2021
I bought the Bose QC35 II headphones, and I love them. They sound great, they are comfortable enough that I can wear them all day with no discomfort, and they have noise cancelling which is fantastic ...
Continue ReadingOctober 22, 2021
Google Cloud Armor provides web application firewall (WAF) capabilities and helps to prevent distributed denial of service (DDoS) attacks. It can also help you to mitigate the threat to applications f ...
Continue ReadingOctober 22, 2021
Use Google Cloud Armor as a WAF layer along with Apigee. Use reCAPTCHA Enterprise for securing your web applications and APIs. Use Cloud CDN for caching of static content, images, videos, etc., across ...
Continue ReadingOctober 22, 2021
Moesif makes API analytics easy and actionable with its machine-learning based platform that helps developers monitor, troubleshoot, and secure their APIs. Moesifs customers include some of the larg ...
Continue ReadingOctober 22, 2021
Back to Main