安全
-
OAuth 2.0 Beginner’s Guide
This article provides an overview of OAuth 2.0 protocol. It discusses the different actors and steps involved in the process of OAuth 2.0 implementation. Introduction: OAuth stands…
-
Linus Torvald’s House [Comic]
文章来源于互联网:Linus Torvald’s House [Comic]
-
Secure Spring REST With Spring Security and OAuth2
In this post, we are going to demonstrate Spring Security + OAuth2 for securing REST API endpoints on an example Spring Boot project. Clients and user credentials will be stored in…
-
Angular + React: Vulnerability Cheatsheet
Securing applications is not the easiest thing to do. An application has many components: server-side logic, client-side logic, data storage, data transportation, API, and more. Wi…
-
Hacking and Securing Python Applications
Securing applications is not the easiest thing to do. An application has many components: server-side logic, client-side logic, data storage, data transportation, API, and more. Wi…
-
A Complete and Comprehensive Guide to ISO 27001 Compliance
Image Source It’s not unfair to say that our online data is caught in a tug-of-war between continually updated security controls and hackers that relentlessly find new, inventive w…
-
An Introduction to PCI Compliance
There are plenty of reasons for enterprises that work with cardholder data to care about payment card industry (PCI) compliance. For starters, maintaining PCI compliance is an esse…
-
How to Write an Effective Penetration Test Report
What Is an Effective Penetration Testing Report? Following the recent trend of cyberattacks against IT infrastructure, service organizations have a steady rise in demand to conduct…
-
How to Improve Your WordPress’ Website Security
WordPress security has been an important topic ever since the content management system was released back in 2003. As with any highly popular piece of software with a long and rich…
-
Scalable JWT Token Revokation in Spring Boot
With stateless JWT Tokens for security, short TTLs (1 min) can be used. These tokens are then refreshed during their time to live. If the server does not get to know when a user ha…