When Satoshi Nakamoto’s revolutionary paper Bitcoin: A Peer-to-Peer Electronic Cash System hit the world, it took the stage by storm. It introduced the concept of Blockchain: a trustless and fully decentralized peer-to-peer immutable data storage.
Blockchain has been hailed as the most secure system for recording information by the tech…
In the previous article, we discussed about HSTS protocol and its benefits. We strongly recommend you read it before you proceed.
Now that you understand and appreciate the usefulness of HSTS, in this post we will talk about the implementation of HSTS protocol in your websites and your APIs.
Using an HTTPS protocol is considered to be the best practice to secure communication over a network. But is this really effective? Turns out the answer is NO!
HTTPS protocol was originally created to serve the following purposes:
Within the infosec and SecOps community, NVD is a well-known entity, but we realised outside of it, there are few who are aware of its existence.
So what is it exactly?
NVD stands for National Vulnerability Database. It is one of the largest collection of vulnerabilities that have been reported…