The Evolution of Software Development: From Machine Code to AI Orchestration

The Evolution of Software Development: From Machine Code to AI Orchestration

Major tech companies now generate 30% of code with AI. Explore the dramatic shift from manual coding to AI orchestration—and why the next 3 years will transform who can build software ...
Unlocking the Gates: REST API Authentication Methods for Modern Security

Unlocking the Gates: REST API Authentication Methods for Modern Security

From Basic Auth’s simplicity to OAuth 2.0’s delegated muscle, this quick-read unpacks the strengths, gaps, and best-fit use cases of the four core REST API authentication methods—so you pick security that scales, ...
All About Authentication and Authorization Tokens: A Comprehensive Guide

All About Authentication and Authorization Tokens: A Comprehensive Guide

Understand different token types, from bearer tokens to PATs, along with their implementation strategies and security considerations. Perfect for developers, architects, and security professionals building secure systems ...
Bluesky AT Protocol: Building a Decentralized TikTok

Bluesky AT Protocol: Building a Decentralized TikTok

The Bluesky AT Protocol aims to decentralize social media, empowering users with control over their data and interactions. By shifting power away from centralized platforms like TikTok, it paves the way for ...
Tanya Janca on Secure Coding, AI in Security, and Her New Book!

Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book

Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in ...
What is Hashing? A Complete Guide for Developers and Security Professionals

What is Hashing? A Complete Guide for Developers and Security Professionals

Hashing is a fundamental concept in computer science and security. This comprehensive guide explores what hashing is, how it works, and its crucial role in data protection. Developers and security professionals will ...
Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy

Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy

Businesses face mounting cyber threats and data breaches from third-party vendors. Open-source CIAM solutions offer a secure, transparent alternative for customer identity management. Discover how these solutions provide enhanced security, complete data ...
Comprehensive Guide to API Error Code Management

Comprehensive Guide to API Error Code Management

Mastering API error codes is essential for building robust and user-friendly applications. This comprehensive guide explores best practices for handling and documenting errors, ensuring clear communication between your API and its users ...
The impact of automating open source dependency management

The impact of automating open source dependency management

Recently, I chatted with developers from a customer in a heavily regulated industry. They were manually updating their open source dependencies and wanted to find a better solution to save time. Keeping ...