I’m a web developer and I like to make things.

I've been working as a full-stack web developer for the past 7 years, with my main focus on frontend development (HTML5/CSS3/JS). I also have experience in backend development (PHP) and mobile app dev ...

Continue Reading
Health-ISAC is excited to bring Salt Security, the leading API security company, into the Health-ISAC group of Community Services with a special offer for Members.

Health Information Sharing and Analysis Center (Health-ISAC), the global non-profit that provides the health sector with a trusted community for sharing cyber and physical security threats, is excited ...

Continue Reading
1.

SaltStack  is a configuration management tool for automating the provisioning and configuration of servers, applications, and services across physical, virtual, and cloud environments. It is written ...

Continue Reading
Banks and fintechs are on the partnership track.

tl;dr: Banks and fintechs are on the partnership track. tl;dr: Banks and fintechs are on the partnership track https://t.co/zt5CBq8PAI ...

Continue Reading
The best way to get the most out of your money is to spend it on experiences instead of material goods.

If you want to know more, here’s a longer version: I was recently reading an article about how spending money on experiences makes us happier than spending it on material things. The author used thi ...

Continue Reading
Broken user authentication can lead to stolen or leaked access tokens, which are then used by attackers to impersonate users.

API #3: Excessive Data Exposure The third vulnerability is excessive data exposure. This happens when an API exposes too much information about the underlying system and its resources. For instance, ...

Continue Reading
WS Security is not enough to secure your SOAP web services.

WS Security Threats and Countermeasures The WS-Security standard does not provide a complete security solution, but it can help you achieve some of the following goals: Confidentiality – ensure tha ...

Continue Reading
Use access tokens to authenticate users.

If you’re using access tokens, make sure they are generated and invalidated properly, and that the token is not leaked via another vulnerability. API #3: Excessive Data Exposure The third vulnerabi ...

Continue Reading

Back to Main

Subscribe for the latest news: