Have you heard about SOPS? If you have already been in a situation where you needed to share sensitive information with your teammates, this is for you.
Is API mocking in unit tests important, or does it do nothing? I think the answer is a bit more nuanced, but we do need such tests to reduce daily churn.
DevSecOps is a cultural approach to integrate security in our CI/CD pipeline. It ensures security is implemented on every stage of the SDLC and infrastructure.
Navigating the world of privacy and compliance is no trivial task. In this post, take a look at the data privacy API: the what, the why, the how, and the who.
This article will briefly discuss what SSH certificates are, why you should be using them, and the key distinctions between them and X.509 certificates.
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Second case: an AWS secret is found in a private repository.
As my geo-distributed app development journey ends, let’s look at several database multi-region deployment options to keep the read and write latency low no matter the user’s location.
JWT tokens can replace passwords for a safer and more secure cloud-native future. Follow this tutorial to get JWT AuthN working with your Python application.
This article will compare the primary security key management services solution use cases among the Azure key vault, AWS KMS, Google CKMS, and other Cloud key management solutions.