Loading...
Categories

Docker: Life Before and After

Docker: Life Before and After Containers have been around for over a decade. But prior to Docker’s explosive success which began in 2013, they were not well-known at all. Long gone are the days of chroot, containers are all the rage now, and with them comes a whole new set of development and security challenges. […]


Git security best practices

Git security best practices In this article, we will discuss different methods to avoid some common pitfalls when it comes to Git security. We live in a world where it is hard not to know about Git, the most popular Distributed Version Control System (DVCS). Free and open-source, it has been initially created by Linus […]


Go vs C: Why Consider Go Instead of C?

Go vs C: Why Consider Go Instead of C? Go, also known as Golang, is a programming language developed by Google in 2009. It was designed to be a high-performance language that is easy to both use and maintain. C was created by Dennis Ritchie as a general-purpose programming language and has been used in […]


How to avoid issues with DNS security and privacy

How to avoid issues with DNS security and privacy Even with HTTPS encryption, your DNS queries can still be tracked, revealing your browsing habits. Traditional DNS lacks data integrity and authenticity, exposing you to privacy risks. This article explores DNS security and privacy issues, highlighting the potential threats that arise from these vulnerabilities and offering […]


JWT handling best practices

JWT handling best practices JWT (JSON Web Token) is a go-to solution for user authentication and authorization in web apps, enabling secure data exchange between parties. It’s a top choice for custom security implementations, not just for its robust security features but also because it’s widely supported across nearly all major technologies. JWT structure A […]


Legacy: Automotive security – Interview with Jozef Szakál, Audi Hungária

Legacy: Automotive security – Interview with Jozef Szakál, Audi Hungária Cybersecurity is now a critical factor in the automotive industry, as software increasingly controls vehicle functions and ensures communication between components. This shift has enhanced comfort but also introduced new challenges and vulnerabilities. To dive deeper into how the industry is handling these concerns, we […]