Mr.PlanBDitching VPNs: How to Securely Expose Your Apps with mTLS and Reverse ProxiesFor many who self-host services, the standard advice is to hide everything behind a VPN. While VPNs are often seen as a go-to solution for…Sep 21
Nisanth SimonGuide: Setting up mTLS Authentication with OpenSSL for Client-Server CommunicationIn this article, we will delve into the concept of mutual Transport Layer Security (mTLS) authentication and discover how OpenSSL can…Aug 22, 20233
AI SageScribeUnified Learning: Mastering Multi-task learning in Machine LearningMultitask learning (MTL) is an innovative approach in machine learning that simultaneously trains a single model on multiple related tasks…Sep 17Sep 17
Mihaita TintainING Hubs RomaniaA simple mTLS guide for Spring Boot microservicesIn a Zero trust network nothing is trusted by default. When something calls our API, how can we be sure the caller is the right one?Feb 8, 20223Feb 8, 20223
Felipe Polo-WoodSecuring an API with mTLS — Part 1Every day, it becomes more crucial to use secure practices during the development of any application to mitigate security risks once the…Sep 4Sep 4
Mr.PlanBDitching VPNs: How to Securely Expose Your Apps with mTLS and Reverse ProxiesFor many who self-host services, the standard advice is to hide everything behind a VPN. While VPNs are often seen as a go-to solution for…Sep 21
Nisanth SimonGuide: Setting up mTLS Authentication with OpenSSL for Client-Server CommunicationIn this article, we will delve into the concept of mutual Transport Layer Security (mTLS) authentication and discover how OpenSSL can…Aug 22, 20233
AI SageScribeUnified Learning: Mastering Multi-task learning in Machine LearningMultitask learning (MTL) is an innovative approach in machine learning that simultaneously trains a single model on multiple related tasks…Sep 17
Mihaita TintainING Hubs RomaniaA simple mTLS guide for Spring Boot microservicesIn a Zero trust network nothing is trusted by default. When something calls our API, how can we be sure the caller is the right one?Feb 8, 20223
Felipe Polo-WoodSecuring an API with mTLS — Part 1Every day, it becomes more crucial to use secure practices during the development of any application to mitigate security risks once the…Sep 4
S PoonChoosing Between mTLS and JWT over TLS: A Practical Guide For Securing IBM APIC SubsystemsIn a previous article on secure communication between subsystems in IBM API Connect (APIC), an interesting discussion emerged about when to…May 29
Felipe Polo-WoodSecuring an API with mTLS — Part 2In the first part (Part 1), we discussed the need to secure the information in the last segment of an API’s transit: between the API…Sep 4
Payal JindalinGoogle Cloud - CommunityConfiguring mTLS for Apigee X Southbound Traffic FlowBefore diving into mTLS, let us first understand how one-way TLS works.Dec 27, 20221