victoria.dev Logo
  • Home
  • Blog
  • About

Security

  • If you want to build a treehouse, start at the bottom

    security leadership May 11, 2020 • 5 min read

    How threat modeling and pushing left help create a stable foundation for secure software.

  • Outsourcing security with 1Password, Authy, and Privacy.com

    security privacy data March 16, 2020 • 5 min read

    Take some work off your plate while beefing up security with three changes you can make today.

  • Breaking Bottlenecks: Engineering for Performance and Productivity

    compsci development security go python leadership February 25, 2020 • 12 min read

    A deep dive into solving critical performance bottlenecks for building efficient and scalable systems, improving developer efficiency, and reducing operational costs.

  • Three healthy cybersecurity habits

    security privacy December 26, 2019 • 4 min read

    Three helpful cybersecurity new year resolutions. Happy holidays!

  • Secure web forms for the front-end developer

    security leadership December 11, 2019 • 4 min read

    How to design secure web forms: validate, sanitize, and control.

  • The surprisingly difficult task of printing newlines in a terminal

    security December 4, 2019 • 4 min read

    Your guide to string interpolation quirks that confound the best of us.

  • The care and feeding of an IoT device

    security privacy November 27, 2019 • 4 min read

    Why IoT devices are, basically, puppies, and whether or not you should give somebody one for Christmas.

  • A cron job that could save you from a ransomware attack

    security cloud data architecture November 13, 2019 • 7 min read

    How a simple scheduled job can help you quickly recover from ransomware.

  • Secure application architecture basics: separation, configuration, and access

    security architecture data September 30, 2019 • 7 min read

    A starting point for building secure application architecture, for busy developers.

  • How users and applications stay safe on the Internet: it's proxy servers all the way down

    security September 16, 2019 • 9 min read

    An overview of how proxy servers form the basis of online anonymity, and how their use in various forms helps both users and web applications.

← Previous
1 2 3
Next →
← All Tags
Victoria Drake

Victoria Drake

© 2025 · All rights reserved

X Github Email