The AppSec Augury
Connect
Say goodbye to dot-dot-slash attacks.
I'm going to be niching down a little bit . . . and also not.
Don't roll your own SSH servers . . . or data storage flows.
Let's shore up our logging and get it ready for production!
Most developers see logging as lines of text -- let's go one step further.
When an attacker can make you second guess what you're seeing, you have a problem.
A guardian? What's she hiding?
JWTs are great, if you can use them right.
Time for some Polars data science!
It's so easy to not know, and yet so easy to do.
Chatbot, meet Ferris.
It's not just big organizations that need to worry about this.