Posts
-
Application Secrets Management
Protect your application secrets and credentials from misuse by implementing a Vault solution, tailored to your use case.
-
Agile/Scrum for onshore/offshore hybrid model – Part II
Do's and Don't s for Agile / Scrum teams for what works with respect to roles, meetings, processes and tools.
-
Agile/Scrum for onshore/offshore hybrid model – Part I
Agile / Scrum patterns for a world where onshore/offshore teams exist, with a quiz style information leaflets about the world of Agile
-
Enterprise Security – Part IV – Web Application Security
In this series of application design and security, protecting our applications for malicious attacks.
-
Enterprise Security – Part II – Validate the server
In this series of application design and security, verifying the identity of the server for our applications with public/private certs.
-
Enterprise Security – Part III – Validate the client (with certs)
In this series of application design and security, verifying the identity of the client for our applications with certificates.
-
Enterprise Security – Part I – Login Validation
In this series of application design and security, here is the basic one to start with for Authentication patterns for our applications.
-
Enterprise Security
An application architects thoughts on how security should be thought of and designed for enterprise applications.