1.

You can't have a "tournament" without rules, so I'm going to lay out the rules for this tournament here. 2. If you want to participate in the tournament, read these rules and then post below saying t ...

Continue Reading
I’m a software engineer living in San Francisco.

I like to make things, and I like to teach others how to make things too. I've been working with computers since the early 90s when my dad brought home an old 386 IBM clone that he picked up at a gar ...

Continue Reading
The feedback loop that discovers, monitors, and secures APIs must be automated to ensure the DevOps team’s agility is not impeded.

The first step in establishing a successful relationship between SecOps and DevOps teams is to establish an API security feedback loop that can discover, monitor, and secure APIs. The feedback loop sh ...

Continue Reading
1.

You can't make a single-player game that is also a multiplayer game. 2. The only way to make a multiplayer game is to have the players play against each other, not with each other (or at least not in ...

Continue Reading
1.

Study Notes and Theory is a CISSP study tool that provides members with over 800+ complex practice questions, 54+ hours of video training focused on core concepts, downloadable PDF notes, exam strateg ...

Continue Reading
I’m a software engineer at Google, and I work on the Android team.

I grew up in rural Minnesota, where my dad was an electrical engineer for 3M. He worked on lots of cool stuff like magnetic recording tapes and Scotchgard fabric protector (which is actually pretty co ...

Continue Reading
The CIS Controls are a set of 20 security controls that can be used to assess the security posture of an organization.

The CIS Controls were developed by The Center for Internet Security (CIS) as a framework for improving cybersecurity. The idea is that if you follow these 20 best practices, your organization will hav ...

Continue Reading
The code example is a simple to use, end-to-end solution for mutual TLS secured API calls.

The example uses the following components: Identity Server - OpenID Connect server that issues access tokens and refresh tokens. This can be used as an OAuth2 Authorization Server or an OIDC Hybrid F ...

Continue Reading

Back to Main

Subscribe for the latest news: