You can't have a "tournament" without rules, so I'm going to lay out the rules for this tournament here. 2. If you want to participate in the tournament, read these rules and then post below saying t ...
Continue ReadingOctober 23, 2021
I like to make things, and I like to teach others how to make things too. I've been working with computers since the early 90s when my dad brought home an old 386 IBM clone that he picked up at a gar ...
Continue ReadingOctober 23, 2021
The first step in establishing a successful relationship between SecOps and DevOps teams is to establish an API security feedback loop that can discover, monitor, and secure APIs. The feedback loop sh ...
Continue ReadingOctober 23, 2021
You can't make a single-player game that is also a multiplayer game. 2. The only way to make a multiplayer game is to have the players play against each other, not with each other (or at least not in ...
Continue ReadingOctober 23, 2021
Study Notes and Theory is a CISSP study tool that provides members with over 800+ complex practice questions, 54+ hours of video training focused on core concepts, downloadable PDF notes, exam strateg ...
Continue ReadingOctober 23, 2021
I grew up in rural Minnesota, where my dad was an electrical engineer for 3M. He worked on lots of cool stuff like magnetic recording tapes and Scotchgard fabric protector (which is actually pretty co ...
Continue ReadingOctober 23, 2021
The CIS Controls were developed by The Center for Internet Security (CIS) as a framework for improving cybersecurity. The idea is that if you follow these 20 best practices, your organization will hav ...
Continue ReadingOctober 23, 2021
The example uses the following components: Identity Server - OpenID Connect server that issues access tokens and refresh tokens. This can be used as an OAuth2 Authorization Server or an OIDC Hybrid F ...
Continue ReadingOctober 23, 2021
Back to Main