<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">

Easy to Implement JSON Web Token (JWT) Bugs: How to Avoid and

As I was doing some training the other day I came across some rather interesting bugs in a commonly used technology: ...

The Unintended Consequences of Alexa

In InfoSec (some just call it ‘Cyber’), we deal with and talk a lot about unintended consequences. There is a general ...

Depths of Defense

Is Your Application’s Defense Plan Really Battle Ready? Always have a backup plan. Sounds simple, right? You’d think ...

How Do We Get There From Here? A Look At Capability Maturity -

Let’s say you wanted to go for a day trip from your home in New York City to “Minnewaska State Park Preserve” The ...

Want more of the AsTech Blog? You got it.
Blog subscribers get email updates twice a week.

Comments