cicd
Subscribe
Sign in
Home
About
which platforms should your startup use to build software
Considerations Startups with limited resources should avoid spending too much effort on managing infrastructure. Resources should be focused on building…
Aug 7
•
cxmcc
1
Share this post
which platforms should your startup use to build software
blog.cicd.com
Copy link
Facebook
Email
Notes
Other
New
Defending against Credential Stuffing Attacks
Credential stuffing is an attack where attacker writes a script to automatically make username/password login attempts on a target service, with leaked…
Feb 6
•
cxmcc
Share this post
Defending against Credential Stuffing Attacks
blog.cicd.com
Copy link
Facebook
Email
Notes
Other
Avoid the Term: Microservice
“Microservice” started as a noble trend of breaking apart monolithic applications. A few years in, the term has become another engineering buzzword that…
Jan 30
•
cxmcc
1
Share this post
Avoid the Term: Microservice
blog.cicd.com
Copy link
Facebook
Email
Notes
Other
Integrating Google Sign-In for Web Applications, the Security Considerations
Google Sign-In is one of the most popular third-party login methods. Google Sign-In is my personally favorite Sign-In method as a security-conscious…
Jan 3
•
cxmcc
Share this post
Integrating Google Sign-In for Web Applications, the Security Considerations
blog.cicd.com
Copy link
Facebook
Email
Notes
Other
cicd
shares experience on Cloud Infrastructure and Security
Subscribe
cicd
Subscribe
About
Archive
Sitemap
Share this publication
cicd
blog.cicd.com
Copy link
Facebook
Email
Notes
Other
cicd
shares experience on Cloud Infrastructure and Security
By cxmcc
· Launched 9 months ago
Subscribe
No thanks
By registering you agree to Substack's
Terms of Service
, our
Privacy Policy
, and our
Information Collection Notice
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts