PinnedHow to create an effective test automation strategyThis article outlines some test automation best practices and answers the following questions:Oct 1, 2018A response icon6Oct 1, 2018A response icon6
PinnedPublished inVX CompanySecure .NET microservices with Azure Container Apps and DAPRThe concept of microservices sounds fairly easy. And it is. Until you start adding requirements. For example, here are some common…Nov 1, 2022A response icon1Nov 1, 2022A response icon1
Why Data Sovereignty Is A Hot TopicWhen you scroll through LinkedIn, you’ve probably seen posts that sound alarming, warning you not to rely on American IT vendors anymore.May 20May 20
Set up a SPA+BFF with ASP.NET Core and Angular in 3 steps (.NET 8)Last year I wrote an article about how to set up a SPA + BFF with .NET 7. In short, to scaffold an ASP.NET Angular project in .NET 7 and…Jan 24, 2024Jan 24, 2024
Three examples of SSO gone wrongSingle Sign-On (SSO) allows a user to authenticate once and sign in to various applications. SSO is great; it makes the web more secure by…Dec 12, 2023A response icon2Dec 12, 2023A response icon2
Published inThe Web Application Security HubUnderstanding OAuth2Explaining the concepts, use-cases, and possibilities of the OAuth2 protocolAug 2, 2023A response icon6Aug 2, 2023A response icon6
Published inThe Web Application Security HubThe Back-end For Front-end Security PatternIn today’s digital landscape, delivering exceptional user experiences while ensuring robust security measures is paramount for the success…Aug 2, 2023A response icon2Aug 2, 2023A response icon2
Published inThe Web Application Security HubDistributed appsA distributed app is an app that runs on several machines in a network. A distributed app processes workload by delegating parts of the…Aug 2, 2023Aug 2, 2023
Published inThe Web Application Security HubWhat is a reverse proxy?Reverse proxies are used to route traffic to servers in a network. Or, from a Kubernetes perspective: A reverse proxy is used to route…Aug 2, 2023Aug 2, 2023
Published inThe Web Application Security HubWhat is Authorization Code with Proof Key for Code Exchange?The Authorization Code flow with Proof Key for Code Exchange (PKCE) is an authentication method. It’s part of OAuth2. It is used to…Aug 2, 2023Aug 2, 2023