

How Abuse Cases Work to Protect Performance, Stability and Security
Abuse happens when we expect users to behave in a certain manner and only in that manner. This was not covered in your use cases; it’s time for abuse cases.
Abuse happens when we expect users to behave in a certain manner and only in that manner. This was not covered in your use cases; it’s time for abuse cases.
The rise of the DevOps team methodology in modern software development has had a profound effect on application security in both good and bad ways.
There are common DevOps industry issues for all tech professional,though we all want the same thing: to deliver value to our customers.
Let’s look at some best practices to help secure internal applications while maintaining accessibility using a commonsense approach.
Octopus Deploy is a great tool for managing deployments. One of its most powerful features is how variables are organized.
Octopus Deploy variables can be stored in AWS Secrets Manager to meet organizational requirements.
What are we building? The goal of this post is to create a simple ASP.NET Core Hosted Blazor WebAssembly website