developers

The Evolution of Software Development: From Machine Code to AI Orchestration
Major tech companies now generate 30% of code with AI. Explore the dramatic shift from manual coding to AI orchestration—and why the next 3 years will transform who can build software ...

Unlocking the Gates: REST API Authentication Methods for Modern Security
From Basic Auth’s simplicity to OAuth 2.0’s delegated muscle, this quick-read unpacks the strengths, gaps, and best-fit use cases of the four core REST API authentication methods—so you pick security that scales, ...

Shadow downloads – How developers have become the new perimeter
With great power comes great responsibility ...

All About Authentication and Authorization Tokens: A Comprehensive Guide
Understand different token types, from bearer tokens to PATs, along with their implementation strategies and security considerations. Perfect for developers, architects, and security professionals building secure systems ...

Bluesky AT Protocol: Building a Decentralized TikTok
The Bluesky AT Protocol aims to decentralize social media, empowering users with control over their data and interactions. By shifting power away from centralized platforms like TikTok, it paves the way for ...

Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book
Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in ...

What is Hashing? A Complete Guide for Developers and Security Professionals
Hashing is a fundamental concept in computer science and security. This comprehensive guide explores what hashing is, how it works, and its crucial role in data protection. Developers and security professionals will ...

Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy
Businesses face mounting cyber threats and data breaches from third-party vendors. Open-source CIAM solutions offer a secure, transparent alternative for customer identity management. Discover how these solutions provide enhanced security, complete data ...

Comprehensive Guide to API Error Code Management
Mastering API error codes is essential for building robust and user-friendly applications. This comprehensive guide explores best practices for handling and documenting errors, ensuring clear communication between your API and its users ...

The impact of automating open source dependency management
Recently, I chatted with developers from a customer in a heavily regulated industry. They were manually updating their open source dependencies and wanted to find a better solution to save time. Keeping ...