


JWT handling best practices
JWT handling best practices Máté Simon-Takács (Content developer, Avatao) JWT, short for JSON web tokens, is a popular method for managing user authorization and authentication in web applications. It is designed for allowing parties to transmit information securely....
Interview with Christian Martorella, Skyscanner
Interview with Christian Martorella, Skyscanner Tell us a bit about yourself I am currently the CISO for Skyscanner, but I started my career in cybersecurity more than 20 years ago. I started in offensive security focusing on penetration testing, web application...
Ruby needs security
Ruby needs security Máté Simon-Takács (Content developer, Avatao) Ruby was created by Japanese developer Yukihiro Matsumoto in the mid-1990s and has since become one of the top ten most commonly used programming languages. The main goal of the project was to create a...
Understanding the importance of vulnerability management
The importance of vulnerability management Cybercriminals are constantly searching for security weaknesses so they can access your computer and your sensitive data, and the most common causes of these exploitations are software and network vulnerabilities. These...
Recent Comments