PinnedCybersecurity Challenges and the Paradox of Centralized Cloud Infrastructure in the Decentralized…In this article, we explore the security challenges faced by Web3 projects due to their dependence on centralized cloud infrastructure…Apr 20, 2023Apr 20, 2023
Understanding MDR, XDR, and EDR: A Guide to Choosing the Right Security Solution for Organizations…As cyber threats grow more sophisticated, proactive security solutions have become increasingly critical. Managed Detection and Response…Nov 13Nov 13
Luis Arroyo — From Gamer to Masters in Cybersecurity and Elite Security EngineerCan you tell us about yourself?Nov 5Nov 5
Resonance Reflections: Quality Assurance (QA) vs. Security Testing: Separate Roles, Shared GoalsSoftware development is a complex process, involving multiple stages, from design and coding to testing and deployment. Two critical…Oct 17Oct 17
Bejamin Brucher — From Computer Programmer to Star Software Developer and Web3 ProfessorCan you tell us about yourself?Oct 7Oct 7
Resonance Reflections: SIM Swapping vs.In today’s hyper-connected world, our phones have become essential to managing everything from banking to social media. But with this…Sep 12Sep 12
Resonance Reflections: Implementation and Security Considerations of Real-World Token Bonding…Token bonding curves. You may have heard about them being used in DeFi on platforms such as UniSwap and Curve Finance. They are the…Aug 9Aug 9
A Journey Through NEAR Protocol’s Storage — When Removing Doesn’t Necessarily Mean Deleting (Part…PrefaceJul 15Jul 15
A Journey Through NEAR Protocol’s Storage — When Removing Doesn’t Necessarily Mean DeletingWhat is NEAR?Jul 9Jul 9