The current state of the game is that we have a working prototype, but it’s not ready for prime time.

We need to do more work on it before we can release a playable version. We're going to be doing some playtesting at PAX East this weekend and will hopefully get some useful feedback from players ther ...

Continue Reading
I’m a big fan of the new features in C# 6.

0, but I don’t think they should be used until you understand how they work and what their limitations are. I was recently asked to give an introductory talk on some of the new features in C# 6.0 at ...

Continue Reading
API8:2019 Broken Access Control APIs are often designed with the assumption that all users have access to all resources, which is not always true.

By exploiting this issue, attackers can gain access to other users’ resources and/or administrative functions. API9:2019 Insufficient Logging & Monitoring Insufficient logging and monitoring of ...

Continue Reading
APIClarity is a new open source solution to ensure API visibility and enhance API security.

APIClarity is an open-source tool that provides developers with the ability to monitor, detect changes in, and reconstruct OpenAPI specifications for their cloud native applications. APIClarity also a ...

Continue Reading
If you’re a writer, get your work out there.

If you’re an editor, hire writers and give them the freedom to write their own stuff https://t.co/plOQ2w5xia ...

Continue Reading
I’m a big fan of the new C# 6.

0 features, but I don’t think they are enough to make me want to use it in production code yet. I was very excited when Microsoft announced that they would be adding support for some new language fe ...

Continue Reading
APIs are at the core of any successful digital transformation strategy and any new application development strategy.

And when third parties want to integrate with your platform, well-built APIs make that integration much more straightforward and secure. Those third parties are important, and sometimes your company i ...

Continue Reading
Broken user authentication happens when the API is not properly validating access tokens.

API #3: Excessive Data Exposure Excessive data exposure refers to when an API exposes more information than necessary. Attackers can then use this extra information to perform attacks like identity t ...

Continue Reading

Back to Main

Subscribe for the latest news: