Category: Mix
Sharing thoughts and approaches on DevSecOps, which integrates development (Dev), security (Sec), and operations (Ops) to embed security throughout the…
Organizations are adopting bug bounty programs more and more as part of a layered security strategy to address the skills…
A summary of common security vulnerabilities in GraphQL and their mitigation strategies. GraphQL provides superior flexibility and efficiency compared to…
In this article, I’ll explain Server-Sent Events (SSE), one of the technologies for implementing real-time data communication in web applications….
A guide on securing WebSocket to protect real-time applications from common vulnerabilities. This article covers the security vulnerabilities of WebSocket,…
Cookies play a crucial role in web applications, but at the same time, they require careful attention to security settings….
A guide to understanding and implementing Subresource Integrity (SRI) for enhanced web security. Subresource Integrity (SRI) is a security feature…
Learn about Content Security Policy (CSP), its importance, how it works, and how it enhances web security. What is Content…
Setting up new Wi-Fi? Picking the type of password you need can seem like an arbitrary choice. After all, WEP,…
You can now subscribe to my email list on victoria.dev! Here’s how I lovingly built a subscription sign up flow…
A significant part of the process of creation is the ability to imagine things that do not yet exist. This…
In the tech teams I lead, “priority” has no plural form. Whether you’re leading a team of people or leading…









