AvataoSmart Contract SecurityBlockchain-based platforms are becoming increasingly popular due to their ability to maintain a public distributed ledger, providing…Nov 28, 2018Nov 28, 2018
AvataoMake AWS infrastructure more secure with the help of IAMThe trend to move to the cloud seems to be unstoppable that raises more and more security concerns. AWS can be considered the leader in…Oct 24, 2018Oct 24, 2018
AvataoHow to dive into web-security as a developerGreat developers possess a wide variety of skills, from technological expertise to product thinking. You need some of these for your…Oct 10, 2018Oct 10, 2018
AvataoSemancat versioningTackling the versioning pains of a greenfield project with cats.Sep 28, 2018Sep 28, 2018
AvataoSecurity issues to be aware of before moving to the cloudAs more and more infrastructures are moved to the cloud data centers, services offered by the cloud providers became an obvious target for…Sep 18, 2018Sep 18, 2018
AvataoHow to use Git in a secure wayWe live in a world where it is hard not to know Git, the most popular Distributed Version Control System (DVCS). Free and open source, it…Sep 12, 2018Sep 12, 2018
AvataoAre you ready to be cloud native and secure?Due to the heavy demand to scale our services, there is unexpected urgency to be cloud native. This shift allows for abstracting our…Sep 4, 2018Sep 4, 2018
AvataoReport a vulnerability in a responsible way!If you have found a vulnerability and you want to act responsibly, discretion is most important. Always remember you have information that…Aug 29, 2018Aug 29, 2018
AvataoBroken Access ControlAccess control, or authorization, is how a web application grants access to resources to some users, and not others. These resources mostly…Aug 28, 2018Aug 28, 2018
AvataoLearn about CSP-based XSS protectionThe security model of web is rooted in the same-origin policy. Each origin is isolated from the rest of the web and codes should only have…Aug 28, 2018Aug 28, 2018