Opcito TechnologiesThe art of security in software development: Opcito approachImagine millions of users’ credit card details and personal information exposed because of a security flaw. Unfortunately, this isn’t a…2 min read·10 hours ago--
Taylor ArmerdinginNerd For TechWant to protect yourself from AI attacks? The feds have lots of advice on thatA presidential executive order on AI has generated lots of advice from federal agencies, and most of it comes down to security basics.7 min read·May 28, 2024--2
Ken Van CampinTech and MeOpen Source: The Free Software That Isn’tCyber attacks occur every day. How much will it cost to stop them?·7 min read·4 days ago--4--4
Dana CraneBest Practices for Hardened Docker ContainersContainers are how the modern software industry packages an application together with its runtime environment. This makes applications far…5 min read·2 days ago----
Taylor ArmerdinginNerd For TechWith AI hacks looming, don’t ignore security basicsArtificial intelligence is, predictably, being used for good and evil. And in the online world, that means AI-enabled hacks.6 min read·Mar 18, 2024--2--2
Opcito TechnologiesThe art of security in software development: Opcito approachImagine millions of users’ credit card details and personal information exposed because of a security flaw. Unfortunately, this isn’t a…2 min read·10 hours ago--
Taylor ArmerdinginNerd For TechWant to protect yourself from AI attacks? The feds have lots of advice on thatA presidential executive order on AI has generated lots of advice from federal agencies, and most of it comes down to security basics.7 min read·May 28, 2024--2
Ken Van CampinTech and MeOpen Source: The Free Software That Isn’tCyber attacks occur every day. How much will it cost to stop them?·7 min read·4 days ago--4
Dana CraneBest Practices for Hardened Docker ContainersContainers are how the modern software industry packages an application together with its runtime environment. This makes applications far…5 min read·2 days ago--
Taylor ArmerdinginNerd For TechWith AI hacks looming, don’t ignore security basicsArtificial intelligence is, predictably, being used for good and evil. And in the online world, that means AI-enabled hacks.6 min read·Mar 18, 2024--2
Raksit MANTANACHARUinNonTechCompanySecure Angular configuration/credentials in containerized environment (as of 2021)Are you developing a containerized Angular app with configuration/credentials varying between environments? If so, continue reading :)4 min read·Jul 20, 2021--
MarsDevsQuantum Cryptography in Secure SoftwareTechnology in the past few years has advanced and the common populace cannot even imagine the technology used at secure facilities and…5 min read·Jun 4, 2024--
Omid Eidivandi (XaaXaaX)inAWS TipImpersonation using AWS CongitoSecurity stands as a foundational element in software development, often taking center stage in architecture decisions and assessments. The…13 min read·Apr 29, 2024--