Blockchain Vulnerabilities: Sybil attack & 51% attackWhat is a Sybil Attack and how it can leverage the 51% attack on Blockchain?Jan 9Jan 9
An introduction to Generative AIImagine a super smart robot that has a special power: it can create amazing things! It can write stories, draw pictures, and even make up…Dec 4, 2024Dec 4, 2024
An overview of threat modeling: Securing your applications proactivelyIn today’s rapidly evolving digital landscape, security is still being seen as a cost center for many companies, since securing products…May 22, 2024May 22, 2024
This is what you need to know if you want to become a Security Software EngineerIntroductionAug 30, 2022Aug 30, 2022
Vault secrets as environment variablesIf you are a DevSecOps engineer working with Vault to provide a secure way to handle secrets and you are reading this post, then there are…Jul 1, 20222Jul 1, 20222
A software troubleshooting guide — Tips & TricksI’ve been a software engineer for more than 4 years now, on the last job I had, I was doing a kinda “software escalation engineer role” in…Mar 22, 2022Mar 22, 2022
Public key infraestructure — PKIThe Public key infrastructure (PKI) is a framework (guideline) that consists of several security policies, communication protocols, and…Mar 13, 20221Mar 13, 20221