Developers Identity and Authentication Detangled Identity management, Authentication, and Authorization is hard for many people to understand. But it doesn't have to be, if you take a few minutes to understand the core principles: Identification - Who do
Containers Container ENV configs are an Anti-Pattern Using the OS Environment to configure your containers is an insecure practice, and we need to stop encouraging people to do it! The 12-factor app says to use the running Environment of a
Security Quick links to Freeze your Credit A quick list of links to freeze your credit. You can do a free 6-month freeze, or a long-term. Prices vary for the long term. You need to freeze each credit reporting agency
Security Biological Network Security *Note: this article was originally published on Security Focus, 16-Jan-2002. I have updated it in places to be more relevant to the current world constraints. Like a raging cancerous growth the Internet has