Interview with Tamás Lengyel, Intel

Interview with Tamás Lengyel, Intel

Interview with Tamás Lengyel Tell us a bit about yourself Hey everyone! I work at Intel as a Senior Security Researcher in the Software and Advanced Technologies Group. My team has a very wide scope in terms of software security at Intel: we have a company-wide...
Deserialization vulnerabilities in Java

Deserialization vulnerabilities in Java

Deserialization vulnerabilities in Java Understanding serialization and deserialization vulnerabilities is the first step toward building secure applications. For most developers, it’s a challenge to find the right balance between coding securely and meeting other...
JWT handling best practices

JWT handling best practices

JWT handling best practices Máté Simon-Takács (Content developer, Avatao) JWT, short for JSON web tokens, is a popular method for managing user authorization and authentication in web applications. It is designed for allowing parties to transmit information securely....
Interview with Christian Martorella, Skyscanner

Interview with Christian Martorella, Skyscanner

Interview with Christian Martorella, Skyscanner Tell us a bit about yourself I am currently the CISO for Skyscanner, but I started my career in cybersecurity more than 20 years ago. I started in offensive security focusing on penetration testing, web application...