Single Sign-On (SSO), has become a very popular method of authentication. Read on to learn about the two different methods available for implementing SSO.
Buckle up for a 30-minute talk about the current state of IoT data and a demo that tackles MQTT, TLS, load balancing, session persistence, and plenty more.
When you're tasked with keeping software secure, teamwork is paramount. Learn how you can use Slack to quickly respond to security threats and vulnerabilities.
When it comes to streaming media, a proxy solution can be of big benefit. But there are often a lot of questions around what can and cannot be done. Read on for some FAQs about how Varnish can be used in this scenario.
As open source code becomes a greater part of the foundation of the tech we use every day, it's important that developers know how to check it for security vulnerabilities.