Ruween IddagodaScaling Amazon ECS Services for Efficient SQS Queue HandlingThis article serves as a continuation of the initial post authored by Ahmed Azzam and Sebastian Lee titled “Amazon Elastic Container…4 min read·Feb 4, 2024--1--1
Ruween IddagodaSynchronizer Token Pattern for Cross-Site Request Forgery PreventionWithin the contemporary context in which most of the communication and transactions are taking place over the web, the data being…5 min read·Feb 21, 2022----
Ruween IddagodaDouble Submit Cookie for Cross-Site Request Forgery PreventionOne of the extensively used alternatives for Synchronizer Token Pattern, for protection against Cross-Site Request Forgery, is the Double…3 min read·Feb 21, 2022----
Ruween IddagodaWhat is API security?An Application Programming Interface (API) can be defined as the middle man to a program’s backbone. Modern software is designed as stacks…9 min read·Feb 21, 2022----
Ruween IddagodaPractical Approach to Implementing ISO 27001 — summaryWhat is ISO 27001?5 min read·Feb 21, 2022----
Ruween IddagodaHow to setup Multi-factor Authentication with OpenVPN Community EditionOverview of the Process2 min read·Feb 21, 2022----