Category: Mix
Organizations are adopting bug bounty programs more and more as part of a layered security strategy to address the skills…
A summary of common security vulnerabilities in GraphQL and their mitigation strategies. GraphQL provides superior flexibility and efficiency compared to…
In this article, I’ll explain Server-Sent Events (SSE), one of the technologies for implementing real-time data communication in web applications….
A guide on securing WebSocket to protect real-time applications from common vulnerabilities. This article covers the security vulnerabilities of WebSocket,…
Cookies play a crucial role in web applications, but at the same time, they require careful attention to security settings….
A guide to understanding and implementing Subresource Integrity (SRI) for enhanced web security. Subresource Integrity (SRI) is a security feature…
Learn about Content Security Policy (CSP), its importance, how it works, and how it enhances web security. What is Content…
Setting up new Wi-Fi? Picking the type of password you need can seem like an arbitrary choice. After all, WEP,…
You can now subscribe to my email list on victoria.dev! Here’s how I lovingly built a subscription sign up flow…
A significant part of the process of creation is the ability to imagine things that do not yet exist. This…
In the tech teams I lead, “priority” has no plural form. Whether you’re leading a team of people or leading…
If you’ve ever half-written a software project before taking a few days off, this is the article you’ll discover you…








