This is the third in a three-part series on REST APIs. You can read the...Continue reading
The Challenges in Securing REST APIs
This is the second in a three-part series on REST APIs. You can read the entire series...Continue reading
SSL and TLS Explained
Recently there have been several high-profile vulnerabilities involving SSL and TLS. Many people do not...Continue reading
The Growing Need to Secure REST APIs
This is the first in a three-part series on REST APIs. You can read the entire...Continue reading
Understanding Internet Protocol Security (IPsec)
IPSEC is the most popular form of VPN used today. It is important to understand...Continue reading
Ham v Spam: what’s the difference?
One of the most common calls I answer from Network Administrators is: “Why are we...Continue reading