Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.
By Dennis Byrne
This article explores securing data using keyed hashing in Python.
From Spring Security in Action by Laurentiu Spilca In this article, we discuss the components which act in an OAuth 2 authentication implementation. You need to know these components and the role they play in order to properly implement them…. Continue Reading →
From The Art of Network Penetration Testing by Royce Davis
From GitOps and Kubernetes by Billy Yuen, Alexander Matyushentsev, Todd Ekenstam, and Jesse Suen
This article delves into Canary deployments: what they are; how they work; and where you might consider using them.
From Self-Sovereign Identity by Drummond Reed & Alex Preukschat
This article delves into the constituent parts of Self-Sovereign Identity (SSI), and how they work together.