Ensuring the security of API calls is crucial for protecting sensitive data, preventing unauthorized access, and maintaining the integrity of the system. Read all
There are several pitfalls while securing containers and containerized ecosystems. Let's discuss the top three challenges in detail so you can manage them. Read all
This article shows how a Java-based client application can connect to an e-mail server via IMAP protocol after obtaining an OAuth 2.0 access token. Read all
DevSecOps is a cultural approach to integrate security in our CI/CD pipeline. It ensures security is implemented on every stage of the SDLC and infrastructure. Read all
WebAuthn is the FIDO Protocol that defines a passwordless means of authentication. This article gives a rundown of the process and how the user sees it. Read all
In this article we present a novel way to protect your container applications post-exploitation. This additional protection is called Seccomp-BPF. Read all
Learn about API vulnerability in Safari 15 leaking user info, vulnerabilities in AWS, and a podcast with Rinki Sethi and Alissa Knight discussing API security. Read all