Clickjacking Attacks and How to Prevent Them
Learn how clickjacking attacks implement visual tricks to capture users' clicks, and how you can prevent them by applying client-side and server-side solutions.
Dynamic Authorization with GraphQL and Rules
Build a Flask and GraphQL quidditch management system that uses Auth0 rules to implement ABAC and GBAC.
The Business Value of Identity
IAM is either making your business money or draining resources. Here’s how.
Preventing Command Injection Attacks in Node.js Apps
Attackers can use Node.js apps to hack into your systems. Learn how to stop them.
Identity, Unlocked...Explained | Episode 4
Daniel Fett joins the podcast today to talk about the security BCP document.
Bugcrowd’s Bug Bounty Program: Crowdsource Your App Security
A global community of ethical hackers brings new perspectives to the hunt for vulnerabilities
Standing up for my beliefs and values.