Learn how to protect your web application from SSRF vulnerabilities by learning what exactly they are and how bad actors can use them to target your system.
Spring Security 5.0 offers a host of new tools for your authentication needs. Let's see how to use it and OIDC together to secure your Spring-based apps.
In the first installment of this series, we'll learn about the concept of microservices and look at how to create a microservice with Spring Boot and Spring Cloud.
If you're interested in using security headers to help protect your websites, there are a number of approaches you can take. Let's explore some of the popular ones.
Check out this open source project to get a start on your microservices architecture, learn about the tools you need to connect your microservices, and more.
With JAR files, you've got your fat JARs, thin JARs, and skinny JARs, but here's an overview of Hollow JARs and how they sit between an app server and an Uber JAR.
Using some form of secret rotation when using web tokens to encrypt payloads is important to any security strategy. Read on for an example of how to implement this.