BLOG POSTS

Insights, Innovations and Inspirations from the Tech World

The Backbone of Cybersecurity: Hardware Security Modules

The Backbone of Cybersecurity: Hardware Security Modules

2024-06-09

Understand the critical role of Hardware Security Modules (HSMs) in protecting sensitive data, managing cryptographic keys, and ensuring secure transactions, identities and applications.

Hacking APIs (2) - Broken Authentication

Hacking APIs (2) - Broken Authentication

2024-06-03

Discover how broken authentication vulnerabilities can compromise API security and learn best practices to safeguard against these threats.

Hacking APIs (1) - Broken Object-Level Authorization

Hacking APIs (1) - Broken Object-Level Authorization

2024-05-27

Explore the subtleties of Broken Object-Level Authorization (BOLA) in API security through an engaging festival analogy.

Exposing APIs (1) - A Business Perspective

Exposing APIs (1) - A Business Perspective

2024-05-11

Explore the critical role of APIs in digital business strategies and their impact on software development and integration...

Hidden Heroines

Hidden Heroines

2024-03-08

The (often) untold story of women in tech and beyond...

Memory Safety: A Key to Robust Cybersecurity Strategies?

Memory Safety: A Key to Robust Cybersecurity Strategies?

2024-03-02

Learn how memory-safe programming languages such as Rust and Go are transforming cybersecurity stategies by preventing vulnerabilities.

Cracking Rhysida: Decrypting Ransomware

Cracking Rhysida: Decrypting Ransomware

2024-02-28

Discover how a team of South Korean researchers cracked the Rhysida ransomware, overcoming robust encryption methods like AES and RSA.

Podchasov vs. Russia: ECHR Rejects Encryption Backdoors

Podchasov vs. Russia: ECHR Rejects Encryption Backdoors

2024-02-20

Analyzing the ECHR's landmark case Podchasov vs. Russia on encryption backdoors, privacy rights and state surveillance...

The Tietoevry Breach: Lessons Learned?

The Tietoevry Breach: Lessons Learned?

2024-02-18

Discover the key insights and lessons from the Tietoevry ransomware attack that targeted a Swedish data center, causing a significant loss of customer data and backups...

AI in Coding: GitClear Report Shows Downward Pressure on Code Quality

AI in Coding: GitClear Report Shows Downward Pressure on Code Quality

2024-01-30

Explore the insights from GitClear's 2023 report on how AI coding assistants like GitHub Copilot are impacting code quality and technical debt...

Beyond DSS: Expanding Horizons in PCI Compliance

Beyond DSS: Expanding Horizons in PCI Compliance

2024-01-19

Explore the landscape of PCI Security Standards, including innovations in payment security and compliance...

Quantum Computing and Cryptography - The Future of Secure Communication

Quantum Computing and Cryptography - The Future of Secure Communication

2024-01-10

Discover the intersection of quantum computing and cryptography and its implications for future secure communication...

Rust - The Revolutionary Programming Language

Rust - The Revolutionary Programming Language

2024-01-07

Discover why Rust is the most desired programming language in 2023...

WebAssembly - Towards a Better Web

WebAssembly - Towards a Better Web

2024-01-04

Explore the impact and potential of WebAssembly in modern web development...

The Rise of AI in Software Development

The Rise of AI in Software Development

2024-01-03

Explore how AI-driven tools are reshaping software development, offering new opportunities and challenges for programmers.

Terminal-First: My Tech Ecosystem in 2024

Terminal-First: My Tech Ecosystem in 2024

2024-01-01

Get an inside look at my tech ecosystem in 2024, including CLI and TUI tools, Debian, Neovim and other tools.