Skip to main content

Security

Thought leadership as well as effective ways to solve cloud security issues.

A login screen with a blank username and hidden password with the text "Authentication Isn't Everything"
Headshot of Alex Leung.

Authentication Isn’t Everything

Dec 10, 2024
by Alex Leung
Alex Leung explains why fortifying one's login API and loosening other parts of one's security posture can lead to cybersecurity issues.
Security
Illustration of a padlock in front of an illuminated data network with the following text: "Pad Credit Card Information to Protect Your Customers’ Wallets"
Headshot of Alex Leung.

Pad Credit Card Information to Protect Your Customers’ Wallets

Dec 5, 2024
by Alex Leung
We take a look at a recently-assessed API, to see how it avoided the problem that helped the Allies beat the Axis powers in World War II.
Security
An ominous-looking room that mostly lies in the dark, with only the floor being visible. The text reads, "In the Dark about Shadow APIs?"
Headshot of Alex Leung.

In the Dark about Shadow APIs?

Oct 31, 2024
by Alex Leung
Shadow APIs aren’t typically a risk you would think about when developing APIs. See real-world examples to understand the threats they pose.
Security
Illustration of an angled browser window that shows a mouse cursor close to the security lock symbol of a website address. The text reads, "Loose Lips Can Sink Websites Too", with the words "sink" and "websites" being highlighted in bold.
Headshot of Alex Leung.

Loose Lips Can Sink Websites Too

Oct 21, 2024
by Alex Leung
This blog dives into how exposed version numbers in your tech stack can lead to serious vulnerabilities, and what you can do to tighten security.
Security
Illustration with the text "Pay Attention to Your Non-Production Subdomains"
Headshot of Alex Leung.

Pay Attention to Your Non-Production Subdomains

Oct 17, 2024
by Alex Leung
Security teams often focus on an organization's main production domain. Learn why paying attention to your non-production subdomains matters.
Security
An illustration that shows a stop watch and a shield with a check mark with the text "Cutting Latency, Not Security"
Headshot of Philip McGuinness.

Cutting Latency, Not Security

Oct 3, 2024
by Philip McGuinness
Content Security Policy (CSP) is a security feature implemented in browsers to protect websites and web applications from attacks.
Security
The Cloud-Powered Enterprise: Securing Your Cloud, featuring Joseph Glover, DIrector, Field Compute Technology, Akamai, featured image.

The Cloud Powered Enterprise: Securing the Cloud

On-Demand
September 20, 2024
Explore the latest strategies and technologies for cloud security, including identity and access management, data encryption, threat detection, and data security posture management with experts from leading cloud security companies.
Security
Illustration of a security question and answer entry capture screen, with text Pointless May Not Be Harmless.
Headshot of Alex Leung.

Pointless May Not Be Harmless: The Story of a Login Page with a Blank Security Question

Sep 17, 2024
by Alex Leung
Discover how attackers exploit security vulnerabilities in login pages and learn how to protect your web applications with best practices.
Security
A leaking pipe with the text "Security in your DevOps Pipeline: Is your GraphQL API leaky?"
Headshot of Alex Leung.

Security in Your DevOps Pipeline

Sep 10, 2024
by Alex Leung
Not disabling introspection before going live can pose a major security risk. We offer steps to improve security in your DevOps pipeline.
Security
Compliance Automation with Harry.

Compliance Automation Tools Explained | Protecting Data and Customers

In this video, Harry explains the significance of Compliance Automation and shows how to use Compliance Automation tools like Chef.
Security
How to Protect Yourself from Ransomware Attacks featuring Steve Winterfeld, featured image.

How To Protect Yourself From Ransomware Attacks | Steve Winterfeld, Akamai

In this video, Steve Winterfeld, Advisory CISO at Akamai, shares advice on how companies can protect themselves from ransomware attacks.
Security
Wazuh is a Cybersecurity Powerhouse featuring Code with Harry.

Wazuh is a Cybersecurity Powerhouse | Expert Open Source Security Monitoring & Response

@CodeWithHarry covers Wazuh, an open-source security platform used for collecting and analyzing security data.
Security