cicd
Subscribe
Sign in
Home
About
New
Defending against Credential Stuffing Attacks
Credential stuffing is an attack where attacker writes a script to automatically make username/password login attempts on a target service, with leaked…
cxmcc
Feb 6
Share this post
Defending against Credential Stuffing Attacks
blog.cicd.com
Copy link
Twitter
Facebook
Email
January 2023
Avoid the Term: Microservice
“Microservice” started as a noble trend of breaking apart monolithic applications. A few years in, the term has become another engineering buzzword that…
cxmcc
Jan 30
Share this post
Avoid the Term: Microservice
blog.cicd.com
Copy link
Twitter
Facebook
Email
Integrating Google Sign-In for Web Applications, the Security Considerations
Google Sign-In is one of the most popular third-party login methods. Google Sign-In is my personally favorite Sign-In method as a security-conscious…
cxmcc
Jan 3
Share this post
Integrating Google Sign-In for Web Applications, the Security Considerations
blog.cicd.com
Copy link
Twitter
Facebook
Email
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts