What Is Digital Privacy?
Photo by Josh Hallett. Privacy (and Digital Privacy) is one of those terms that I’ve thrown around a lot in[…]
Read moreThe Intersection of Identity, Integration, API Management, and Application Security.
Photo by Josh Hallett. Privacy (and Digital Privacy) is one of those terms that I’ve thrown around a lot in[…]
Read moreOops (Generated with ChatGPT) / RCBJ Some organizations keep following the same legacy, bad practices even though they know better.[…]
Read morePhoto by Tim Mossholder on Unsplash. Disclosures: AI (ChatGPT) assisted with summarizing this information. Over the last nine years, I’ve[…]
Read moreCloudsStormsSunsetsSunrises / Karsun Designs Recently, I had to setup a SPNEGO example to demonstrate a Kerberos identity integration. The details[…]
Read moreFor the small business owner, should the power going out mean you can’t make money? Should the computer system going[…]
Read moreAuthentication is described in this post. Modern business web applications tend to be a collage of service calls to numerous[…]
Read moreThis post will introduce a generic set of database / datastore security requirements that be used as a starting point[…]
Read moreTokens / SHYCITYNikon For anyone who has been paying attention, this blog post has been a long-time coming for multiple[…]
Read moreGrain / Kamil Porembiński The use of HTTP POST vs HTTP GET for read-only (or query) operations in REST APIs[…]
Read moreThe XML DSig specification is used to provide digital signature functionality to XML Documents. It is is used by numerous[…]
Read more