Posts

Thank you

Your subscription request has been submitted.

You will receive a notification email of new posts when they are published.

There will be an unsubscribe link in the notification emails if you wish to unsubscribe.

OK

Twelve Jade Development Teams go head-to-head in the Jade Secure Coding Tournament

Discussion about Kim’s new book on Cloud Security, some of the content, and links to other useful resources around securing your Cloud environments.

Discussion about Kim’s new book on Docker Security, some of the content, and links to other useful resources around securing your Docker deployments.

Adding Staticman commenting system to BinaryMist blog and Hugo Academic

In this post we discuss the move from the legacy BinaryMist blog on Wordpress.com, along with the BinaryMist website, to a single static site on the Hugo platform hosted on Github Pages.

The shared responsibility model is one that many have not grasped or understood well. Let’s look at the responsibilities of the parties.

Lack of captchas are a risk, but so are captchas themselves…

Not being able to introspect your application at any given time or being able to know how the health status is, is not a comfortable place to be in and there is no reason you should be there.

Redirects to legacy blog post.

This is where A9 (Using Components with Known Vulnerabilities) of the 2013 OWASP Top 10 comes in. We are consuming far more free and open source libraries than we have ever before. Much of the code we are pulling into our projects is never intentionally used, but is still adding surface area for attack. In this post we address the risks and countermeasures.

Redirects to legacy blog post.