- Victoria Drake
How to choose and care for a secure open source project
A few tricks for assessing the security of an open source project.
open source
8 min read
- Victoria Drake
If you want to build a treehouse, start at the bottom
How threat modeling and pushing left help create a stable foundation for secure software.
cybersecurity
5 min read
- Victoria Drake
Outsourcing security with 1Password, Authy, and Privacy.com
Take some work off your plate while beefing up security with three changes you can make today.
cybersecurity
5 min read
- Victoria Drake
Breaking bottlenecks 🍾
A talk on the benefits of non-blocking functions for programs, developers, and organizations.
computing
12 min read
- Victoria Drake
Three healthy cybersecurity habits
Three helpful cybersecurity new year resolutions. Happy holidays!
cybersecurity
4 min read
- Victoria Drake
Secure web forms for the front-end developer
How to design secure web forms: validate, sanitize, and control.
cybersecurity
4 min read
- Victoria Drake
The surprisingly difficult task of printing newlines in a terminal
Your guide to string interpolation quirks that confound the best of us.
terminal
3 min read
- Victoria Drake
The care and feeding of an IoT device
Why IoT devices are, basically, puppies, and whether or not you should give somebody one for Christmas.
cybersecurity
4 min read
- Victoria Drake
A cron job that could save you from a ransomware attack
How a simple scheduled job can help you quickly recover from ransomware.
cybersecurity
7 min read
- Victoria Drake
Secure application architecture basics: separation, configuration, and access
A starting point for building secure application architecture, for busy developers.
cybersecurity
7 min read