Tagged: security

How To Build JWT’s in Go

Go is becoming very popular for backend web development, and JWT’s are one of the most popular ways to handle authentication on API requests. In this article, we are going to go over the...

SSI’s Problem with Data Ownership

Facebook, Google, Amazon. Everybody seems to be out to get your data. No wonder, monetising data is a massive business that propelled centralised data controllers to the market cap stratosphere. But what do you...

How To Improve Banking App Security With GPS Data

Mobile-based fintech solutions are becoming the first port of call for many financial services, as people embrace the simplicity, cost-effectiveness and speed of mobile payments. However, digital fraud is rising as fast, if not...

How to Check Your USB Devices for Unsafe Firmware

Your USB peripherals may be making your PC vulnerable to hackers. The data security firm Eclypsium reports that the majority of Windows and Linux-based peripherals use “unsigned” firmware that leaves them open to all...

Is 128 Bit Encryption Enough?

There are a lot of cloud services that tout encryption strength as a measure of how well they guard your data. It is quoted in bits, which is the size of the key. So...

Closer Than You Think: Bridging the DevOps-Security Gap

The advantages of moving security into the DevOps lifecycle early are well-studied. For example, Puppet’s 2019 State of DevOps Report details numerous ways that both security and DevOps improve when security is integrated into DevOps earlier...