Mar 29 路 5 min read 路 "If you can't measure it, you can't secure it." In this post, I鈥檓 pulling back the curtain on the EduConnect CI/CD pipeline. We aren't just looking at code; we are looking at real-time security telem
Join discussion
Mar 16 路 18 min read 路 In the previous parts of this series, we discussed the authentication vulnerability from the developer鈥檚 point of view. We discussed password requirements based on NIST guidelines, rate limiting using
Join discussion
Mar 10 路 22 min read 路 In Part 1, we discussed the requirements of passwords according to NIST recommendations, various methods of rate limiting using sliding window and exponential backoff, and ways to avoid enumeration of
Join discussion