In Depth
In Depth: Timing Attacks
[InDepth#6] You can use response timing to infer important information.
In Depth
[InDepth#6] You can use response timing to infer important information.
Security Tips
[Tip#15] Since we don't have enough weird edge cases to worry about in security, here's one more: Transliteration allows you to bypass security checks when services like MySQL do magical translation without telling you! 😱
Security Tips
[Tip#14] What is Subresource Integrity and why is it so important for securing your site?
In Depth
[InDepth#5] It sounds easy to rehash passwords, but is it really that easy?
Security Tips
[Tip#13] Blocking Compromised (Pwned) Passwords forces your users to use strong passwords, but is it the right choice for your app?
Security Tips
[Tip#12] It's easy to guess passwords if your app doesn't rate limit attempts...
Security Tips
[Tip #11] Why duplicate password validation rules across your app when you can define defaults once?
In Depth
Placeholders are incredibly useful, but you need to be careful with them.
Security Tips
[Tip#10] You should always selectively stage changes, to avoid committing secrets or debug code and pushing to prod.
Security Tips
[Tip #9] security.txt is a simple way to share your security contacts to make vulnerability reporting easier.
Newsletter
The teams discount link was broken
Newsletter
Get 25% off individual subscriptions, or 50% off teams. Forever.