Category: Mix
A practical guide to moving to cloud services with minimal downtime, using AWS examples. For an application that’s ready to…
On July 4th, 2022, Chief Digital and Artificial Intelligence Office (CDAO), Directorate for Digital Services (DDS), DoD Cyber Crime Center…
Gone are the days when gate-based security processes were the most effective way to ensure security of an organization’s external…
This is member content. Thank you for being a subscriber. .memberful-global-teaser-content p:last-child{ -webkit-mask-image: linear-gradient(180deg, #000 0%, transparent); mask-image: linear-gradient(180deg, #000…
A starting point for building secure application architecture, for busy developers. Software developers today are encouraged to focus on building,…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
October is Cybersecurity Awareness Month, but at HackerOne, we’ve decided it should be Hacker Awareness Month. We want to spend…
TLDR: Proactive external attack surface management (EASM) has become increasingly important than ever before as organizations face an expanding threat…
A fast command line interface solution for batch image processing. Part of my Hugo site continuous deployment workflow is the…
In the last two years of their bug bounty program, the hacker community has helped TikTok identify and disclose 450…
TL/DR: Much like Darlene Alderson from Mr Robot, Goonjeta Malhotra entered the hacking battleground and sharpened her chops after taking…
My Makefile for building this site, optimizing images, and running my CI/CD GitHub Actions flow. Fun fact: I first launched…