cicd

Home
About
New
Defending against Credential Stuffing AttacksCredential stuffing is an attack where attacker writes a script to automatically make username/password login attempts on a target service, with leaked…
cxmcc
Feb 6
Share this post

Defending against Credential Stuffing Attacks

blog.cicd.com

January 2023

Avoid the Term: Microservice“Microservice” started as a noble trend of breaking apart monolithic applications. A few years in, the term has become another engineering buzzword that…
cxmcc
Jan 30
Share this post

Avoid the Term: Microservice

blog.cicd.com
Integrating Google Sign-In for Web Applications, the Security ConsiderationsGoogle Sign-In is one of the most popular third-party login methods. Google Sign-In is my personally favorite Sign-In method as a security-conscious…
cxmcc
Jan 3
Share this post

Integrating Google Sign-In for Web Applications, the Security Considerations

blog.cicd.com
© 2023 cicd.com
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing