LLMs Can’t Stop Making Up Software Dependencies and Sabotaging Everything (tho/the) | | 368 |
ai, dependencies |
Secure a Vue App With OpenID Connect and the BFF Pattern (due) | | 367 |
vuejs, authentication |
Website Hijack Campaign Now Impacting 150,000 Sites (gad) | | 366 |
|
Malware Found on npm Infecting Local Package With Reverse Shell (rev) | | 365 |
npm, dependencies |
Five Things Vibe Coders Should Know (From a Software Engineer) (uxd) | | 364 |
vibe-coding, sanitization |
GitHub Suffers a Cascading Supply Chain Attack Compromising CI/CD Secrets (inf) | | 363 |
github, ci-cd |
How to Prevent WordPress SQL Injection Attacks (sma) | | 362 |
how-tos, wordpress, sql, databases |
Lazarus Strikes npm Again With New Wave of Malicious Packages (soc) | | 361 |
npm, dependencies |
What Is the OWASP Top 10 and How Can Your Team Benchmark Security? (jet) | | 360 |
owasp, vulnerabilities, qodana, jetbrains |
Updates on CVE for End-of-Life Versions (raf/nod) | | 359 |
nodejs |
How to Protect Your Web Applications From XSS (tor/w3c) | | 358 |
how-tos, web-apps, xss |
Secure UX: Building Cybersecurity and Privacy Into the UX Lifecycle (uxm) | | 357 |
user-experience, processes |
The Fallacy of Balance: Challenging the Notion of Security and Accessibility as Opposing Objectives (deq) | | 356 |
videos, accessibility |
It Is No Longer Safe to Move Our Governments and Societies to U.S. Clouds (ber) | | 355 |
cloud-computing, privacy, legal |
How OWASP Helps You Secure Your Full-Stack Web Applications (eri/sma) | | 354 |
owasp, monitoring, authentication, vulnerabilities, configuration, csrf, cryptography, authorization |
10 Common Web Development Mistakes to Avoid Right Now | | 353 |
mistakes, mobile, performance, accessibility, seo, navigation, analytics, testing |
Tightening Every Bolt (bag) | | 352 |
videos, processes, code-reviews, testing |
On Generative AI Security (sch) | | 351 |
ai, lessons, microsoft |
Understanding CORS Errors in Signed Exchanges (paw) | | 350 |
cors, errors, signed-exchanges |
Keep Your Node.js Apps Secure With “npx is-my-node-vulnerable” (tre) | | 349 |
packages, npm, nodejs |
How I Open-Sourced My Secret Access Tokens From GitHub, Slack, and npm—and Who Actually Cares | | 348 |
github, slack, npm |
Node.js EOL Versions CVE Dubbed the “Worst CVE of the Year” by Security Experts (sar/soc) | | 347 |
nodejs, documentation |
Tuesday, January 21, 2025 Security Releases (raf/nod) | | 346 |
release-notes, nodejs |
APIs Are Quickly Becoming the Latest Security Battleground (and Nightmare) (the) | | 345 |
apis |
CDN-First Is No Longer a Performance Feature (osv) | | 344 |
content-delivery, performance, caching, embed-code, privacy |
The Cyber-Cleanse: Take Back Your Digital Footprint (cyb) | | 343 |
privacy |
15 Principles for Secure Programming | | 342 |
principles, validation, testing |
Important Topics for Frontend Developers to Master in 2025 | | 341 |
learning, javascript, typescript, css, frameworks, git, apis, testing, performance, ci-cd, websockets |
Developer Guide: How to Implement Passkeys | | 340 |
guides, how-tos, authentication, passkeys |
How to Automate OWASP Security Reviews in Your Pull Requests? (cod) | | 339 |
how-tos, owasp, automation, code-reviews, tooling |
5 Technical Trends to Help Web Developers Stand Out in 2025 (the) | | 338 |
trends, career, javascript, ai, low-and-no-code |
Avoid Hotlinking Images With “Cross-Origin-Resource-Policy” | | 337 |
images |
Content Security Policy Level 3 (mik/w3c) | | 336 |
standards, csp |
Security (htt) | | 335 |
web-almanac, studies, research, metrics |
JavaScript Import Attributes (ES2025) (tre) | | 334 |
javascript |
Exploring Internet Traffic Shifts and Cyber Attacks During the 2024 U.S. Election (clo) | | 333 |
traffic |
Securing Your Express REST API With Passport.js | | 332 |
nodejs, express, json-web-tokens, apis, rest, tooling |
SecretLint—a Linter for Preventing Committing Credentials (tre) | | 331 |
tooling, linting |
Top 4 Web Vulnerabilities With Example and Mitigation | | 330 |
vulnerabilities, sql, databases, xss, csrf |
The Importance of UX in Cybersecurity (uxm) | | 329 |
user-experience, usability |
Understanding “npm audit” and Fixing Vulnerabilities | | 328 |
npm, vulnerabilities, nodejs |
How to Implement Content Security Policy (CSP) Headers for Astro (tre) | | 327 |
how-tos, http, http-headers, csp, astro, vercel, cloudflare |
Why Code Security Matters—Even in Hardened Environments | | 326 |
vulnerabilities, file-handling, nodejs |
Database 101: SSL/TLS for Beginners | | 325 |
introductions, databases, ssl, tls, authentication |
Cloudflare Study: 39% of Companies Losing Control of Their IT and Security Environment (tre) | | 324 |
studies, research, engineering-management |
NIST Recommends Some Common-Sense Password Rules (sch) | | 323 |
passwords, guidelines |
I Finally Understand OAuth | | 322 |
authorization, oauth, processes |
Fake GitHub Site Targeting Developers (jul/san) | | 321 |
github |
Hacking Cars in JavaScript (Running Replay Attacks in the Browser With the HackRF) (dev) | | 320 |
javascript |
Gaining Access to Anyone’s Browser Without Them Even Visiting a Website | | 319 |
arc, browsers, vulnerabilities |
5 Wasm Use Cases for Frontend Development (des) | | 318 |
guest-posts, webassembly, performance |
Web Security: Shaping the Secure Web (set/w3c) | | 317 |
web, w3c |
What Is Incident Response? | | 316 |
incident-response, overviews |
The Great npm Garbage Patch | | 315 |
dependencies, npm, spam |
Migrating From Netlify to Cloudflare for AI Bot Protection (sia) | | 314 |
migrating, netlify, cloudflare, ai |
Frontend Security Checklist (tre) | | 313 |
checklists, react |
Automated Ways to Security Audit Your Website | | 312 |
auditing, automation, tooling |
Secure Node.js Applications From Supply Chain Attacks | | 311 |
nodejs, best-practices, dependencies |
The Cloud Run Security Gap You Didn’t Know You Had (and How to Fix It) | | 310 |
google, gcp |
The Pitfalls of In-App Browsers (fro) | | 309 |
browsers, mobile, privacy, user-experience |
Supply Chain Security in npm—We Can Be Optimistic About the Future | | 308 |
npm, dependencies, provenance |
Script Integrity (chr/fro) | | 307 |
embed-code, javascript |
WebAuthn: Enhancing Security With Minimal Effort (tbe) | | 306 |
authentication, webauthn |
Introducing the MDN HTTP Observatory (mdn) | | 305 |
introductions, mdn, mozilla, http |
Tuesday, July 2, 2024 Security Releases (nod) | | 304 |
release-notes, nodejs |
RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server | | 303 |
ssh, vulnerabilities |
Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets (lir/sny) | | 302 |
vulnerabilities |
Catching Compromised Cookies | | 301 |
cookies, testing |
Backdoor Slipped Into Multiple WordPress Plugins in Ongoing Supply-Chain Attack (dan/ars) | | 300 |
wordpress, plugins |
The Hacking of Culture and the Creation of Socio-Technical Debt (sch) | | 299 |
culture |
OAuth Authentication (rya) | | 298 |
authentication, authorization, oauth |
What Is Mixed Content? (fre) | | 297 |
http |
Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (sar/soc) | | 296 |
npm, dependencies, vulnerabilities, caching |
The Ultimate Guide to Iframes (log) | | 295 |
guides, frames, html, javascript |
How a Single Vulnerability Can Bring Down the JavaScript Ecosystem | | 294 |
javascript, npm, dependencies, caching, vulnerabilities |
JavaScript Security: Simple Practices to Secure Your Frontend | | 293 |
javascript, dependencies, csp |
Manifesto for a Humane Web (mic) | | 292 |
websites, manifestos, web, principles, accessibility, dei, sustainability, user-experience |
Securing Client-Side JavaScript (ada) | | 291 |
javascript, graceful-degradation |
Poor Express Authentication Patterns in Node.js and How to Avoid Them (lir) | | 290 |
express, nodejs, authentication |
Passkeys: A Shattered Dream (fir) | | 289 |
authentication, passkeys |
Using Legitimate GitHub URLs for Malware (sch) | | 288 |
github |
When Security and Accessibility Clash: Why Are Banking Applications So Inaccessible? | | 287 |
accessibility |
Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects (ope) | | 286 |
foss |
Wednesday, April 10, 2024 Security Releases (raf/nod) | | 285 |
release-notes, nodejs |
Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities (lir) | | 284 |
books, nodejs, vulnerabilities |
The Free Software Commons (jen) | | 283 |
foss, community |
The V8 Sandbox | | 282 |
v8 |
Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks? | | 281 |
dns |
Using JSON Web Tokens With Node.js | | 280 |
json-web-tokens, nodejs, authentication |
Wednesday, April 3, 2024 Security Releases (nod) | | 279 |
release-notes, nodejs |
In-App Browsers Are Still a Privacy, Security, and Choice Problem (tho/the) | | 278 |
browsers, mobile, privacy |
CORS Finally Explained—Simply | | 277 |
csrf, cors, concepts |
How Does Single Sign-On (SSO) Work? (mil) | | 276 |
authentication |
How npm Install Scripts Can Be Weaponized: A Real-World Example of a Harmful npm Package | | 275 |
npm, dependencies, examples |
Preventing SQL Injection Attacks in Node.js (sny) | | 274 |
nodejs, databases, sql |
Frontend Application Security: Tips and Tricks | | 273 |
web-apps, xss, csrf, authentication, dependencies, csp, validation, tips-and-tricks |
Wednesday, February 14, 2024 Security Releases (raf+/nod) | | 272 |
release-notes, nodejs |
How to Boost WordPress Security and Protect Your SEO Ranking | | 271 |
how-tos, wordpress, seo |
Malicious npm Package Masquerades as Noblox.js, Targeting Roblox Users for Data Theft (sar/soc) | | 270 |
npm, dependencies |
Practice Safe DSD With “setHTMLUnsafe” (It’s Complicated) (jar/van) | | 269 |
html, dom, shadow-dom, apis |
Tuesday, February 6, 2024 Security Releases (raf/nod) | | 268 |
release-notes, nodejs |
JWT vs. Session Authentication | | 267 |
authentication, json-web-tokens, comparisons |
GitHub, npm Registry Abused to Host SSH Key-Stealing Malware | | 266 |
github, npm, foss |
Deceptive Deprecation: The Truth About npm Deprecated Packages | | 265 |
npm, dependencies, research |
Safely Accessing the DOM With Angular SSR (dev) | | 264 |
dom, javascript, angular, server-side-rendering |
Node.js Security Progress Report—Progress on Permission Model, Fuzzer, and Connections With Community (ope) | | 263 |
nodejs |
I Hate CORS | | 262 |
videos, cors |
Building Multiple Progressive Web Apps on the Same Domain (dev) | | 261 |
videos, web-apps, progressive-web-apps, architecture |
Session-Based vs. Token-Based Authentication: Which Is Better? | | 260 |
authentication, json-web-tokens, comparisons |
10 Best Practices for Secure Code Review of Node.js Code (lir) | | 259 |
best-practices, code-reviews, nodejs |
Security Headers Using “<meta>” (sap/mat) | | 258 |
csp, html |
Blind CSS Exfiltration: Exfiltrate Unknown Web Pages | | 257 |
css |
Mastering Cryptography Fundamentals With Node’s “crypto” Module | | 256 |
cryptography, nodejs |
Secure Code Review Tips to Defend Against Vulnerable Node.js Code (lir) | | 255 |
nodejs, code-reviews |
Understanding CORS | | 254 |
cors |
What the !#@% Is a Passkey? (eff) | | 253 |
passkeys |
Secret Scanning Scans Public npm Packages (git) | | 252 |
github, npm, dependencies |
Local HTTPS for Next.js 13.5 (ami) | | 251 |
testing, http, nextjs |
Understanding XSS Attacks (ver) | | 250 |
xss |
A Comprehensive Guide to the Dangers of Regular Expressions in JavaScript (phi) | | 249 |
guides, javascript, regex |
SSH Keys Stolen by Stream of Malicious PyPI and npm Packages (ble) | | 248 |
ssh, dependencies, npm |
Best Practices for Securing Node.js Applications in Production | | 247 |
best-practices, nodejs |
npm Provenance General Availability (git) | | 246 |
github, npm, provenance |
Open Source Trends to Look for in 2024 | | 245 |
foss, trends, outlooks, ai |
The WebP 0-Day | | 244 |
webp, google, apple |
Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples (lir) | | 243 |
nodejs, history, examples |
How to Implement SSL/TLS Pinning in Node.js (sny) | | 242 |
how-tos, ssl, tls, nodejs |
A More Intelligent and Secure Web (ple/w3c) | | 241 |
videos, w3c, standards, web, web-platform |
Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works | | 240 |
cors, javascript |
Towards HTTPS by Default (jde/dev) | | 239 |
browsers, google, chrome, http, tls |
Sophisticated, Highly-Targeted Attacks Continue to Plague npm | | 238 |
npm |
An Update on Chrome Security Updates—Shipping Security Fixes to You Faster | | 237 |
browsers, google, chrome |
Tuesday, August 8, 2023 Security Releases (raf/nod) | | 236 |
release-notes, nodejs |
Publishing With npm Provenance From Private Source Repositories Is No Longer Supported (git) | | 235 |
github, npm, provenance, foss |
Social Engineering Campaign Targeting Tech Employees Spreading Through npm Malware (soc) | | 234 |
npm |
Securing the Web Forward: Addressing Developer Concerns in Web Security (tor/w3c) | | 233 |
web, surveys |
Encoding: A Brief History and Its Role in Cybersecurity | | 232 |
encoding, unicode, history |
User Input Sanitization and Validation: Securing Your App | | 231 |
sanitization, validation, conformance |
Node.js Security Progress Report—17 Reports Closed (ope) | | 230 |
nodejs |
The Importance of Verifying Webhook Signatures (sny) | | 229 |
webhooks |
The Massive Bug at the Heart of the npm Ecosystem | | 228 |
npm, dependencies |
Understanding Authorization Before Authentication: Enhancing Web API Security | | 227 |
authorization, authentication, apis, comparisons |
All You Need to Know About CORS and CORS Errors | | 226 |
cors, errors |
An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript (lir) | | 225 |
introductions, vulnerabilities, nodejs, javascript |
Django: A Security Improvement Coming to “format_html()” (ada) | | 224 |
django, html |
Tuesday, June 20, 2023 Security Releases (raf/nod) | | 223 |
release-notes, nodejs |
security.txt Now Mandatory for Dutch Government Websites | | 222 |
legal |
File Upload Security and Malware Protection (aus) | | 221 |
file-handling, edge-computing |
Security Implications of HTTP Response Headers (sny) | | 220 |
http, http-headers |
Generating Provenance Statements | | 219 |
npm, provenance |
Introducing npm Package Provenance (git) | | 218 |
introductions, github, npm, provenance, foss |
8 Best Tools for Cryptography and Encryption (sta) | | 217 |
link-lists, tooling, comparisons, cryptography, encryption, privacy |
Dissecting npm Malware: Five Packages and Their Evil Install Scripts | | 216 |
npm |
Passkeys: What the Heck and Why? (css) | | 215 |
passkeys |
Senior Engineering Strategies for Advanced React and TypeScript (tec) | | 214 |
strategies, react, typescript, architecture, testing, performance, accessibility, maintenance |
Cryptographically Protecting Your SPA | | 213 |
single-page-apps, cryptography |
Without Accessibility, There Is No Privacy or Security | | 212 |
accessibility, privacy |
How to Password-Protect a Static HTML Page With No JS (ede) | | 211 |
how-tos, css, fonts |
Quick Tip: How to Hash a Password in PHP | | 210 |
how-tos, php, passwords, tips-and-tricks |
Sandboxing JavaScript Code | | 209 |
javascript |
Unlocking Security Updates for Transitive Dependencies With npm (git) | | 208 |
npm, dependencies, maintenance |
7 Required Steps to Secure Your Iframes Security | | 207 |
frames, xss, html, http-headers, csp |
Conditional API Responses for JavaScript vs. HTML Forms (aus) | | 206 |
javascript, html, forms, comparisons |
Why Do We Need Authorization and Authentication? | | 205 |
authorization, authentication |
The Top 10 Security Vulnerabilities for Web Applications | | 204 |
vulnerabilities, web-apps |
Leaked a Secret? Check Your GitHub Alerts… for Free (git) | | 203 |
github |
DOM Clobbering (fre/mat) | | 202 |
dom |
New npm Features for Secure Publishing and Safe Consumption (git) | | 201 |
npm, dependencies |
Using SRI to Protect From Malicious JavaScript (mat) | | 200 |
javascript |
WordPress Versions 3.7–4.0 No Longer Get Security Updates (sar) | | 199 |
wordpress |
“Not Secure” Warning for IE Mode | | 198 |
browsers, microsoft, edge, internet-explorer |
Node.js Security Best Practices (nod) | | 197 |
nodejs, best-practices |
npm Security: Preventing Supply Chain Attacks (lir/sny) | | 196 |
npm, dependencies |
Secure JavaScript URL Validation (sny) | | 195 |
javascript, validation, urls |
Create a Passkey for Passwordless Logins (age/dev) | | 194 |
authentication, passkeys |
Designing a Secure API | | 193 |
software-design, apis |
Phylum Detects Active Typosquatting Campaign Targeting npm Developers | | 192 |
npm, dependencies |
Security (lir+/htt) | | 191 |
web-almanac, studies, research, metrics |
Continue Using .env Files as Usual | | 190 |
environments |
Quick Reminder: HTML5 “required” and “pattern” Are Not a Security Feature (cod) | | 189 |
html, forms |
Stop Using .env Files Now | | 188 |
environments |
Debunking Myths About HTTPS | | 187 |
http, myths |
Secure Your Node.js App With JSON Web Tokens (app) | | 186 |
nodejs, json-web-tokens |
Dependabot Unlocks Transitive Dependencies for npm Projects (git) | | 185 |
dependencies, npm |
JavaScript Bugs Aplenty in Node.js Ecosystem—Found Automatically | | 184 |
studies, research, nodejs, javascript, dependencies, quality |
Introducing Even More Security Enhancements to npm (git) | | 183 |
introductions, npm |
Top 5 npm Vulnerability Scanners | | 182 |
npm, vulnerabilities, tooling |
What Is Passwordless Authentication and How to Implement It | | 181 |
authentication, passwords |
GA4 Is Being Blocked by Content Security Policy | | 180 |
csp, metrics, google |
Please Remove That .git Folder | | 179 |
git |
Should I Have Separate GitHub Accounts for Personal and Professional Projects? | | 178 |
discussions, github, career |
Understanding CSRF Attacks (zel) | | 177 |
csrf |
npm Security Update: Attack Campaign Using Stolen OAuth Tokens (git) | | 176 |
oauth, version-control, npm, github |
Snyk Finds 200+ Malicious npm Packages, Including Cobalt Strike Dependency Confusion Attacks (sny) | | 175 |
javascript, npm, dependencies |
Unexpectedly HTTPS? | | 174 |
http |
How to Respond to Growing Supply Chain Security Risks? | | 173 |
how-tos, dependencies, nodejs, npm |
The Web Is for Everyone: Our Vision for the Evolution of the Web (moz) | | 172 |
web, outlooks, privacy, accessibility, performance, user-experience |
Using HTTPS in Your Development Environment | | 171 |
http, environments |
How to Prevent SQL Injection Attacks in Node.js | | 170 |
how-tos, nodejs, databases, sql |
How to Fix Your Security Vulnerabilities With npm Override | | 169 |
how-tos, vulnerabilities, npm, dependencies |
Can You Get Pwned With CSS? | | 168 |
css |
Never, Ever, Ever Use Pixelation for Redacting Text | | 167 |
content, images, obfuscation |
Accessibly Insecure | | 166 |
accessibility |
Lessons Learned From Publishing a Content Security Policy | | 165 |
lessons, csp |
Ain’t No Party Like a Third Party (ada/css) | | 164 |
dependencies, embed-code |
Security (htt) | | 163 |
web-almanac, studies, research, metrics |
GitHub’s Commitment to npm Ecosystem Security (git) | | 162 |
github, npm |
Understanding and Implementing OAuth2 in Node.js | | 161 |
nodejs, authorization, oauth |
How to Win at CORS (jaf) | | 160 |
how-tos, cors, html, http |
The Options for Password-Revealing Inputs (chr/css) | | 159 |
html, css, passwords, usability |
npm Security Best Practices (lir/owa) | | 158 |
npm, best-practices |
Encoding Data for POST Requests (jaf) | | 157 |
javascript, encoding |
NPM Global Audit | | 156 |
packages, npm, quality, auditing |
Understanding and Preventing Common Security Vulnerabilities | | 155 |
vulnerabilities |
Open Source Insights | | 154 |
websites, foss, dependencies, licensing |
Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of | | 153 |
edge-computing |
TLS and mTLS Demystified | | 152 |
tls, protocols |
Best Practices for Inclusive Textual Websites | | 151 |
performance, accessibility, best-practices |
What Is mTLS and How Does It Work? | | 150 |
|
Mutual TLS: Stuff You Should Know | | 149 |
tls, protocols |
Don’t Try to Sanitize Input—Escape Output | | 148 |
sanitization, escaping |
Apple Joins FIDO Alliance, Commits to Getting Rid of Passwords (zdn) | | 147 |
apple, fido, passwords, authentication |
How to Automatically Update Your JavaScript Dependencies (spa/clo) | | 146 |
how-tos, javascript, dependencies, automation, processes |
Usability and Security; Better Together (24w) | | 145 |
usability, user-experience |
Server-Side Includes (SSI) Injection (owa) | | 144 |
ssi |
Web Feature Developers Told to Dial Up Attention on Privacy and Security (rip/tec) | | 143 |
w3c, privacy, web-platform |
Security and Privacy for Our Times (luk/w3c) | | 142 |
privacy, web-platform |
Understanding Subresource Integrity (dre/sma) | | 141 |
hashing, embed-code |
W3C Strategic Highlights: Web for All (Security, Privacy, Identity) (w3c) | | 140 |
w3c, privacy, authentication |
Guide to Web Authentication | | 139 |
websites, authentication, webauthn, javascript |
It’s Beginning to Look a Lot Like XSSmas (24w) | | 138 |
vulnerabilities, csrf, xss |
Protecting Your Site With Feature Policy (rac/sma) | | 137 |
http-headers, http |
AWS Security Guide: 7 Best Practices to Avoid Security Risks | | 136 |
guides, aws, best-practices |
WebAuthn, FIDO2 Infuse Browsers, Platforms With Strong Authentication (dar) | | 135 |
w3c, fido, authentication, webauthn, browsers |
In Your Face, Passwords: Big Three Browsers All Adopt Authentication API | | 134 |
authentication, webauthn, apis, edge, microsoft, chrome, google, firefox, mozilla, browsers |
WordPress Security as a Process (sma) | | 133 |
wordpress, processes |
Making Your Website Faster and Safer With Cloudflare | | 132 |
performance, caching, cloudflare |
Validating Dependencies in the Project With npm-check and depcheck | | 131 |
dependencies, maintenance, auditing, tooling, npm |
Third Party CSS Is Not Safe (jaf) | | 130 |
html, css, embed-code |
Creating Secure Password Resets With JSON Web Tokens (sma) | | 129 |
passwords, json-web-tokens, nodejs |
The Complete Guide to Switching From HTTP to HTTPS (sma) | | 128 |
guides, http |
How (Not) to Control Your CDN (mno) | | 127 |
content-delivery, caching, http |
How to Secure WordPress With SSL | | 126 |
how-tos, wordpress, ssl |
Encrypting IP Addresses (ber) | | 125 |
ip, network, privacy, encryption |
How to Secure Your Web App With HTTP Headers (sma) | | 124 |
how-tos, web-apps, http, http-headers, csp |
Just Another HTTPS Nudge (chr/css) | | 123 |
http |
On EME in HTML5 (tim/w3c) | | 122 |
eme, drm, html, legal, standards, w3c |
Using SSH Securely (ann) | | 121 |
ssh |
More Than 300 Federal Gov Websites Fail to Meet Domain Encryption Deadline | | 120 |
http, tls, protocols, encryption |
Content Security Policy Level 2 (mik+/w3c) | | 119 |
standards, csp |