Ruween IddagodaScaling Amazon ECS Services for Efficient SQS Queue HandlingThis article serves as a continuation of the initial post authored by Ahmed Azzam and Sebastian Lee titled “Amazon Elastic Container…Feb 41Feb 41
Ruween IddagodaSynchronizer Token Pattern for Cross-Site Request Forgery PreventionWithin the contemporary context in which most of the communication and transactions are taking place over the web, the data being…Feb 21, 2022Feb 21, 2022
Ruween IddagodaDouble Submit Cookie for Cross-Site Request Forgery PreventionOne of the extensively used alternatives for Synchronizer Token Pattern, for protection against Cross-Site Request Forgery, is the Double…Feb 21, 2022Feb 21, 2022
Ruween IddagodaWhat is API security?An Application Programming Interface (API) can be defined as the middle man to a program’s backbone. Modern software is designed as stacks…Feb 21, 2022Feb 21, 2022
Ruween IddagodaPractical Approach to Implementing ISO 27001 — summaryWhat is ISO 27001?Feb 21, 2022Feb 21, 2022
Ruween IddagodaHow to setup Multi-factor Authentication with OpenVPN Community EditionOverview of the ProcessFeb 21, 2022Feb 21, 2022