Sometimes I write about my profession, sometimes about other things that interest me. This blog is where you can find those writings https://t.co/ylhfkrUiyq ...
Continue ReadingOctober 22, 2021
That means user accounts! Youll want to give your users control over their own account, and youll want to make sure that only they can access it. This is called authentication . Authentication is ...
Continue ReadingOctober 21, 2021
Limit access to trusted clients with signed certificates. Keep sensitive data from leaving the network via a VPN or other method https://t.co/RSb1pk37AW ...
Continue ReadingOctober 21, 2021
The longer version: If youre looking for the best price, then buying from an individual seller will almost always be cheaper than buying from a dealership. However, there are some things that can ma ...
Continue ReadingOctober 21, 2021
They can be used to scrape sensitive data and sell it on the Dark Web, or they can be used in DDoS attacks against your organizations website or API gateway https://t.co/sgyq2J97yo ...
Continue ReadingOctober 21, 2021
Prepare the test data and environment for the security test. Run the security test in CI, using a separate build from your normal functional testing builds. (This will allow you to run them in parall ...
Continue ReadingOctober 21, 2021
If you're not watching, you should be. I've been a big fan of The Good Place since its first episode aired in 2016. It was created by Michael Schur (Parks and Recreation) and stars Kristen Bell as El ...
Continue ReadingOctober 21, 2021
Microsoft Graph is the future of Microsoft 365 management https://t.co/FkbXtXn8Vh ...
Continue ReadingOctober 21, 2021
Back to Main