Bubu TripathyService-Level Authorization with OAuth 2.0 ScopesService-level authorization is crucial for controlling access to specific resources or actions within a microservice. OAuth 2.0 provides a…Aug 17
PiccosupportEnhancing Microservice Security with CSRF Tokens and JWTsLearn how to fortify your microservices architecture using a combination of Cross-Site Request Forgery (CSRF) tokens and JSON Web Tokens…Mar 22
casimirrex antonyMicroservices Authentication TypesMicroservices authentication can be implemented using several types of mechanisms. Here are some of the common authentication types used in…Jul 30Jul 30
Charith RajithaSecuring gRPC service-to-service communications with mTLSWhat is gRPC?May 28, 20221May 28, 20221
MamunSecuring Your APIs: Simple Guide to API Security — Part 2In the previous Part 1, the basics of API security were discussed. This post elaborates on best practices and provides examples for…Feb 22Feb 22
Bubu TripathyService-Level Authorization with OAuth 2.0 ScopesService-level authorization is crucial for controlling access to specific resources or actions within a microservice. OAuth 2.0 provides a…Aug 17
PiccosupportEnhancing Microservice Security with CSRF Tokens and JWTsLearn how to fortify your microservices architecture using a combination of Cross-Site Request Forgery (CSRF) tokens and JSON Web Tokens…Mar 22
casimirrex antonyMicroservices Authentication TypesMicroservices authentication can be implemented using several types of mechanisms. Here are some of the common authentication types used in…Jul 30
MamunSecuring Your APIs: Simple Guide to API Security — Part 2In the previous Part 1, the basics of API security were discussed. This post elaborates on best practices and provides examples for…Feb 22
InGaranti BBVA TeknolojibyBilal Emre GulsenSecuring Your Microservices: Exploration of Best PracticesMicroservices architecture, an approach to designing software applications as a series of small, independent services, has become…Aug 14
DevSecOps_PractitionerSecuring Kubernetes Clusters: A Guide for Security PractitionersKubernetes has emerged as the de-facto standard for container orchestration, providing organizations with powerful capabilities to deploy…Oct 15, 20231