Ishan DwivediinGeromicsMicroservice Security — A GlossaryA summary of some helpful cyber security definitions and ideas for implementing security for your own microservices!Sep 16, 2022Sep 16, 2022
Ishan DwivediinGeromicsHow OAuth Prevents Phishing ScamsOAuth is a widely adopted standard used by large companies like Amazon, Facebook, Google, and Spotify. For example, Google uses OAuth to…Sep 16, 2022Sep 16, 2022
Ishan DwivediinGeromicsThe Vulnerabilities of a Weak JWT SecretJWTs are a ‘key’ component of Geromics’ security. They are widely used in application security and have been adopted by standards such as…Sep 16, 2022Sep 16, 2022
Ishan DwivediinGeromics8 security services that AWS has to offer, but are they for you?This article will describe the features of AWS’s security services that particularly interested me when doing their Security Learning Plan…Aug 31, 20221Aug 31, 20221