cicd

Home
About
Defending against Credential Stuffing Attacks
Credential stuffing is an attack where attacker writes a script to automatically make username/password login attempts on a target service, with leaked…
Feb 6 • 
cxmcc
New
Avoid the Term: Microservice
“Microservice” started as a noble trend of breaking apart monolithic applications. A few years in, the term has become another engineering buzzword that…
Jan 30 • 
cxmcc
1
Integrating Google Sign-In for Web Applications, the Security Considerations
Google Sign-In is one of the most popular third-party login methods. Google Sign-In is my personally favorite Sign-In method as a security-conscious…
Jan 3 • 
cxmcc
cicd
cicd
shares experience on Cloud Infrastructure and Security

cicd

AboutArchiveSitemap
Share this publication

cicd

blog.cicd.com
cicd Logo

cicd

shares experience on Cloud Infrastructure and Security

By cxmcc
· Launched 5 months ago
By registering you agree to Substack's Terms of Service, our Privacy Policy, and our Information Collection Notice
© 2023 cicd.com
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing