I started off by getting the news that my application to the University of Waterloos Masters in Computer Science program was rejected, which had me feeling pretty down. Then I got some good news abo ...
Continue ReadingAugust 31, 2021
APIs are everywhere nowadays: In web apps, embedded systems, enterprise apps, cloud environments and even IoT, and it is becoming increasingly necessary to learn how to defend, secure and attack API i ...
Continue ReadingAugust 31, 2021
IoT requires inter-networking infrastructure as well as endpoints the objects or things themselves. The estimated value of IoT will be $7 trillion by 2020. The Industrial Internet refers to th ...
Continue ReadingAugust 31, 2021
3. Use API Gateways to Monitor and Control Access Most organizations have a variety of APIs that they use for different purposes. Some may be used by customers or partners while others are intended f ...
Continue ReadingAugust 31, 2021
Its my favorite computer ever, and I use it every day for work and play. The New iPad Pro is Awesome https://t.co/r0dxQmxSiv ...
Continue ReadingAugust 31, 2021
The Good: I really liked how the author approached this subject matter. It was very well researched and he did an excellent job at explaining his reasoning for why he believes what he does. He also p ...
Continue ReadingAugust 31, 2021
APIs are an attack vector that is growing in popularity among cybercriminals. The Forrester report shows how API insecurity can lead to breaches of sensitive data or even entire systems. As APIs becom ...
Continue ReadingAugust 31, 2021
It's based on the idea of limiting trust in incoming traffic and verifying everything, including JWTs. 5. Keep Your Code Up-to-Date With Security Patches This one should be obvious, but it isn't alw ...
Continue ReadingAugust 31, 2021
Back to Main