• home page icon hi
  • blog icon blog
  • about page icon about
  • coffee icon buy me coffee
  • bookshelf icon bookshelf
  • RSS icon rss

grep cybersecurity

Posts with tags including: cybersecurity


  • Victoria Drake

    photo of the author So you're the family tech support

    Privacy and online security to-dos for the home-for-the-holidays tech support hero.

    privacy ☕️  2 min read 2020-12-21 08:42:24 -0500 -0500

  • Victoria Drake

    photo of the author OWASP Web Security Testing Guide v4.2 released

    Announcing the release of a new version of the OWASP WSTG.

    cybersecurity ☕️  2 min read 2020-12-03 16:02:33 -0600 -0600

  • Victoria Drake

    photo of the author Build your own serverless subscriber list with Go and AWS

    How to build your own newsletter list with DynamoDB and SES email sign up confirmations.

    api ☕️ ☕️  7 min read 2020-11-10 04:52:50 -0500 -0500

  • Victoria Drake

    photo of the author WPA Key, WPA2, WPA3, and WEP Key: Wi-Fi security explained

    Which one should you be using? Why Wi-Fi security matters.

    computing ☕️ ☕️  8 min read 2020-10-19 04:02:27 -0400 -0400

  • Victoria Drake

    photo of the author Three rules for choosing a VPN that takes your privacy seriously

    The lesser-known risks of ISPs and why I chose ExpressVPN.

    privacy ☕️ ☕️  6 min read 2020-10-18 04:41:37 -0400 -0400

  • Victoria Drake

    photo of the author Your cybersecurity starter pack

    Basic security best practices to share with your non-technical friend.

    cybersecurity ☕️ ☕️  7 min read 2020-10-04 04:30:12 -0400 -0400

  • Victoria Drake

    photo of the author What is TLS? Transport Layer Security encryption explained in plain english

    How TLS, digital certificates, and sessions help keep communications secure.

    cybersecurity ☕️  5 min read 2020-09-05 04:48:39 -0600 -0600

  • Victoria Drake

    photo of the author Look mom, I'm a GitHub Action Hero

    The GitHub blog interviews me for their GitHub Action Hero series.

    ci/cd ☕️  5 min read 2020-06-27 09:06:33 -0400 -0400

  • Victoria Drake

    photo of the author How to choose and care for a secure open source project

    A few tricks for assessing the security of an open source project.

    open-source ☕️ ☕️  8 min read 2020-05-25 05:53:09 -0400 -0400

  • Victoria Drake

    photo of the author If you want to build a treehouse, start at the bottom

    How threat modeling and pushing left help create a stable foundation for secure software.

    cybersecurity ☕️  5 min read 2020-05-11 05:46:47 -0400 -0400

  • Victoria Drake

    photo of the author Outsourcing security with 1Password, Authy, and Privacy.com

    Take some work off your plate while beefing up security with three changes you can make today.

    cybersecurity ☕️  5 min read 2020-03-16 08:12:32 -0400 -0400

  • Victoria Drake

    photo of the author Breaking bottlenecks 🍾

    A talk on the benefits of non-blocking functions for programs, developers, and organizations.

    computing ☕️ ☕️ ☕️  12 min read 2020-02-25 12:50:29 -0500 -0500

  • Victoria Drake

    photo of the author Three healthy cybersecurity habits

    Three helpful cybersecurity new year resolutions. Happy holidays!

    cybersecurity ☕️  4 min read 2019-12-26 08:27:31 -0400 -0400

  • Victoria Drake

    photo of the author Secure web forms for the front-end developer

    How to design secure web forms: validate, sanitize, and control.

    cybersecurity ☕️  4 min read 2019-12-11 08:27:31 -0400 -0400

  • Victoria Drake

    photo of the author The surprisingly difficult task of printing newlines in a terminal

    Your guide to string interpolation quirks that confound the best of us.

    terminal ☕️  4 min read 2019-12-04 09:17:35 -0500 -0500

  • Victoria Drake

    photo of the author The care and feeding of an IoT device

    Why IoT devices are, basically, puppies, and whether or not you should give somebody one for Christmas.

    cybersecurity ☕️  4 min read 2019-11-27 08:59:35 -0500 -0500

  • Victoria Drake

    photo of the author A cron job that could save you from a ransomware attack

    How a simple scheduled job can help you quickly recover from ransomware.

    cybersecurity ☕️ ☕️  7 min read 2019-11-13 08:27:31 -0400 -0400

  • Victoria Drake

    photo of the author Secure application architecture basics: separation, configuration, and access

    A starting point for building secure application architecture, for busy developers.

    cybersecurity ☕️ ☕️  8 min read 2019-09-30 08:03:12 -0400 -0400

  • Victoria Drake

    photo of the author How users and applications stay safe on the Internet: it's proxy servers all the way down

    An overview of how proxy servers form the basis of online anonymity, and how their use in various forms helps both users and web applications.

    cybersecurity ☕️ ☕️  9 min read 2019-09-16 09:35:28 -0400 -0400

  • Victoria Drake

    photo of the author Hackers are Googling your plain text passwords: preventing sensitive data exposure

    Why sensitive data controls need to be established long before you think you need them, as demonstrated by Google dorking.

    cybersecurity ☕️ ☕️  8 min read 2019-09-09 09:10:11 -0400 -0400

  • Victoria Drake

    photo of the author SQL injection and XSS: what white hat hackers know about trusting user input

    A primer on SQL injection and cross site scripting, and how to handle user input in software development.

    cybersecurity ☕️ ☕️  11 min read 2019-09-02 09:01:23 -0400 -0400

  • Victoria Drake

    photo of the author How to set up OpenVPN on AWS EC2 and fix DNS leaks on Ubuntu 18.04 LTS

    A guide for setting up your own private VPN service, and understanding and fixing a DNS leak.

    aws ☕️ ☕️ ☕️  14 min read 2019-08-26 09:01:23 -0400 -0400


  • first page
  • 1
  • 2
  • 3
  • older / oldest

<< All tags

●
 
  • home page icon
  • blog icon
  • about page icon
  • coffee icon
  • bookshelf icon