In the previous article, we understood what XSS was, and learnt three ways of injecting XSS code into a website, also known as types of XSS. In this and subsequent articles, we'll learn practical techniques based on Zero Trust approach to protect our website from these XSS inject … | Continue reading
A comprehensive whitepaper on Zero Trust security in the context of hosted web apps (APIs, microservices, server-side MVC sites etc.). Describes in details about what is Zero Trust, why Zero trust is becoming increasingly important, key tenets of hands-on Zero Trust security appr … | Continue reading
rapidly build business appications that protect valuable business data from unauthorized access with granular property-level permit checks, defend against multiple attack vectors with mechanisms such as identity firewall, 2FA, entity suspension, password blocking, sandboxed 3rd-p … | Continue reading
rapidly build business appications that protect valuable business data from unauthorized access with granular property-level permit checks, defend against multiple attack vectors with mechanisms such as identity firewall, 2FA, entity suspension, password blocking, sandboxed 3rd-p … | Continue reading
A popular networking related IOT devices provider Ubiquiti got hacked via the leaking of admin user account credentials, exposing millions of devices. Learn how you can protect admin user accounts with two-factor authentication and IP firewall to defend against such attacks. | Continue reading
rapidly build business appications that protect valuable business data from unauthorized access with granular property-level permit checks, defend against multiple attack vectors with mechanisms such as identity firewall, 2FA, entity suspension, password blocking, sandboxed 3rd-p … | Continue reading