Ian KipronoinStackademicHow Rate Limiter WorksRate limiter works on a rather simple premise. On a high level, it counts the number of requests sent by a particular user, an IP address…2d ago
Taylor ArmerdinginNerd For TechRansomware is on a roll — and that’s more than a financial problemAfter decades of ransomware attacks, attackers still have the upper hand. Experts say that’s because of the failure to do security basics.Jul 13
Shubhadeep ChattopadhyayUnderstanding OWASP Security with C# ExamplesThe Open Web Application Security Project (OWASP) is a non-profit organization focused on improving software security. OWASP provides free…Jul 4Jul 4
SlingshotThe Essential Security Checklist for Software DevelopmentDiscover a comprehensive security checklist for software development, covering secure coding, data protection, testing, and more!1d ago1d ago
Taylor ArmerdinginNerd For TechWant to protect yourself from AI attacks? The feds have lots of advice on thatA presidential executive order on AI has generated lots of advice from federal agencies, and most of it comes down to security basics.May 282May 282
Ian KipronoinStackademicHow Rate Limiter WorksRate limiter works on a rather simple premise. On a high level, it counts the number of requests sent by a particular user, an IP address…2d ago
Taylor ArmerdinginNerd For TechRansomware is on a roll — and that’s more than a financial problemAfter decades of ransomware attacks, attackers still have the upper hand. Experts say that’s because of the failure to do security basics.Jul 13
Shubhadeep ChattopadhyayUnderstanding OWASP Security with C# ExamplesThe Open Web Application Security Project (OWASP) is a non-profit organization focused on improving software security. OWASP provides free…Jul 4
SlingshotThe Essential Security Checklist for Software DevelopmentDiscover a comprehensive security checklist for software development, covering secure coding, data protection, testing, and more!1d ago
Taylor ArmerdinginNerd For TechWant to protect yourself from AI attacks? The feds have lots of advice on thatA presidential executive order on AI has generated lots of advice from federal agencies, and most of it comes down to security basics.May 282
Raksit MANTANACHARUinNonTechCompanySecure Angular configuration/credentials in containerized environment (as of 2021)Are you developing a containerized Angular app with configuration/credentials varying between environments? If so, continue reading :)Jul 20, 2021
Dana CraneHow US Government ISVs Can Meet CISA Attestation RequirementsSoftware companies that sell to the US government suddenly face a number of additional hurdles when it comes to developing and maintaining…4d ago
Taylor ArmerdinginNerd For TechWith AI hacks looming, don’t ignore security basicsArtificial intelligence is, predictably, being used for good and evil. And in the online world, that means AI-enabled hacks.Mar 182