In the final part of our series, we look at some of the worst attacks than can be carried out against an insecure SSL/TLS network, and how to stop them.
In the world of security, it's important to know what you're up against. In this post, we've provided a list of the most common and dangerous web attacks.
OCSP (Online Certificate Status Protocol) is a revokable application-level protocol. It can be easily load tested by using JMeter in just ten quick steps.
web3j seamlessly integrates with Spring Frameworks. Simply create a new Spring Boot app, add the starter to your configuration, and create a service with web3j.
In this article, we go over what exactly a JSON Web Token is, how they can be cracked using brute force, and the best way to avoid this security issue.
In this article, we take a look at the JSON Web Tokens (JWT), what advantages they hold, and how they constitute an improvement over older authentication systems.
Learn how to make sense of IaaS architecture, identifying API usage in apps, monitoring external services, dependencies, and APIs, and tackling dependencies.
Because there's not predefined architecture that you can apply directly to your projects, choosing an architecture for your system can prove very difficult.