Here’s What I Learned About Securing APIs With OAuth 2.0: A Deep Dive into OAuth 2.0 Implementation Post date September 24, 2024 Post author By aneesh kumar Post categories In application-development, application-security, oauth, oauth2, security-token
Why Doesn’t Crypto Have Mainstream Adoption? Post date September 28, 2021 Post author By Dmitry Dosov Post categories In blockchain, cryptocurrency, cryptocurrency-exchange, mainstream-adoption-for-crypto, security, security-token, stablecoin, stopping-crypto-mainstream
Ensuring Security: A Guide for Web and Mobile Application Development Post date August 27, 2021 Post author By Nilton De Lima Post categories In authentication, authorization, cyber-security, engineering-security, information-security, security, security-token, web-development
Mette Kibsgaard, DigiShares’s Co-founder & CMO on Gaining Tractions with Customers Post date August 13, 2021 Post author By DigiShares Post categories In asset-tokenization, blockchain-in-real-estate, digital-assets, real-estate-technology, security-token, security-token-offering, startups-of-the-year, tokenized-real-estate
What are ENV Files? – Pros, Cons, Alternatives Post date June 9, 2021 Post author By Doppler Post categories In cybersecurity, devops-security, devsecops, good-company, secret-manager, secrets, security, security-token
How To Get Your Token Listed On A Crypto Exchange (Podcast Transcript) Post date May 19, 2021 Post author By Amy Tom Post categories In crypto, crypto-exchange, cryptocurrency, hackernoon-podcast, podcast, security-token, token, tokenization