Sheizah JimenezMitigating Bias — How Can We Keep Trust In AI?Student Based Research on the Importance of Mitigating Bias in User-Interactive AI5h ago
InAWS in Plain EnglishbyAlice the ArchitectStrengthening DDoS Protection: AWS Best Practices for Resiliency and MitigationLearn the essential AWS strategies and services for protecting your applications from Distributed Denial of Service (DDoS) attacks.Nov 9
InPurpose and Social ImpactbyChristopher NialNo More Hot Air: The 2024 UNEP Report Calls for Urgent Climate ActionThe gap between rhetoric and reality grows wider as nations prepare climate commitments. UNEPs annual report for 2024 is in. It’s not good.Oct 24Oct 24
Stiflernation04A Guide to Mitigate Host Header Injection Vulnerability in Apache, Nginx, and IIS ServersHello readers, My name is Gaurav Pant and I am a cybersecurity professional with six years of experience in the field. I have a passion for…Jan 30, 2023Jan 30, 2023
Vijay GuptaCross-Site Request Forgery (CSRF): Understanding and Mitigating the Risk 🔒Cross-Site Request Forgery (CSRF) is a common yet dangerous web vulnerability that exploits the trust a web application has in a user…Oct 24Oct 24
Sheizah JimenezMitigating Bias — How Can We Keep Trust In AI?Student Based Research on the Importance of Mitigating Bias in User-Interactive AI5h ago
InAWS in Plain EnglishbyAlice the ArchitectStrengthening DDoS Protection: AWS Best Practices for Resiliency and MitigationLearn the essential AWS strategies and services for protecting your applications from Distributed Denial of Service (DDoS) attacks.Nov 9
InPurpose and Social ImpactbyChristopher NialNo More Hot Air: The 2024 UNEP Report Calls for Urgent Climate ActionThe gap between rhetoric and reality grows wider as nations prepare climate commitments. UNEPs annual report for 2024 is in. It’s not good.Oct 24
Stiflernation04A Guide to Mitigate Host Header Injection Vulnerability in Apache, Nginx, and IIS ServersHello readers, My name is Gaurav Pant and I am a cybersecurity professional with six years of experience in the field. I have a passion for…Jan 30, 2023
Vijay GuptaCross-Site Request Forgery (CSRF): Understanding and Mitigating the Risk 🔒Cross-Site Request Forgery (CSRF) is a common yet dangerous web vulnerability that exploits the trust a web application has in a user…Oct 24
Morgan KittCompTIA Security+ 701 2.5Mitigation techniques are methods used to reduce the risk or impact imposed by security threats and bad actors. These can range from small…Jul 7
S. W. Lawrence, MDFlood MitigationNYT: “America’s Flooding Problem.” When asked why flood damage in the US keeps rising [2023 estimated costs $180 billion], Chad Berginnis…Oct 231
zerosandonesDefending Against Cross-Site Scripting (XSS) Attacks: Techniques and StrategiesCross-Site Scripting (XSS) is a widespread and dangerous vulnerability that affects web applications. Just like SQL injection, XSS attacks…Sep 1, 2023