DEV Community

loading...
Warren Parad profile picture

Warren Parad

Long time software architect, creating application security plug-ins for any software application with Authress. Talk to me about security in microservices or service authorization.

Work

Co-Founder and CTO at Rhosys

JWT access token misconceptions

JWT access token misconceptions

Reactions 6 Comments
6 min read
AWS + Gitlab — Leveling up security of your CICD platform.

AWS + Gitlab — Leveling up security of your CICD platform.

Reactions 6 Comments
4 min read
Creating resources in custom AWS accounts

Creating resources in custom AWS accounts

Reactions 8 Comments
2 min read
AWS DynamoDB: Single or Multitable

AWS DynamoDB: Single or Multitable

Reactions 8 Comments
1 min read
To message bus or not to message bus

To message bus or not to message bus

Reactions 5 Comments
4 min read
Making an infinite CSS carousel

Making an infinite CSS carousel

Reactions 54 Comments
4 min read
Security for deleting resources

Security for deleting resources

Reactions 7 Comments
4 min read
The Wolf Pack Team

The Wolf Pack Team

Reactions 7 Comments
3 min read
Things that are wrong with Terraform

Things that are wrong with Terraform

Reactions 5 Comments
2 min read
Breach — Enabling emergency data protection

Breach — Enabling emergency data protection

Reactions 6 Comments
6 min read
Promotion in Action: What everyone should know to get to the next level

Promotion in Action: What everyone should know to get to the next level

Reactions 7 Comments
8 min read
API Authentication :  Creating service client API keys

API Authentication :  Creating service client API keys

Reactions 10 Comments 1
3 min read
Setup user authentication with any identity provider

Setup user authentication with any identity provider

Reactions 8 Comments
3 min read
Validating JWTs in Web APIs

Validating JWTs in Web APIs

Reactions 11 Comments
2 min read
Choosing the right access control strategy

Choosing the right access control strategy

Reactions 11 Comments
7 min read
Creating the right environment

Creating the right environment

Reactions 6 Comments
9 min read
How to secure a multitenant application architecture

How to secure a multitenant application architecture

Reactions 15 Comments
4 min read
Choosing the right error code 401, 403, or 404

Choosing the right error code 401, 403, or 404

Reactions 6 Comments 1
4 min read
Zoombombing — a case study of data protection

Zoombombing — a case study of data protection

Reactions 9 Comments
8 min read
So you want to build your own authorization?

So you want to build your own authorization?

Reactions 9 Comments
4 min read
7 Steps to Web Application Security

7 Steps to Web Application Security

Reactions 12 Comments
5 min read
Hacking your Product Support Strategy

Hacking your Product Support Strategy

Reactions 19 Comments
11 min read
Initramfs: Dropping to a Shell

Initramfs: Dropping to a Shell

Reactions 7 Comments
4 min read
AWS Free Tier Cost

AWS Free Tier Cost

Reactions 13 Comments
3 min read
X-Ray in Lamba

X-Ray in Lamba

Reactions 13 Comments
5 min read
Javascript private fields are coming

Javascript private fields are coming

Reactions 15 Comments 5
2 min read
Leadership in technology: the four pillars of growth

Leadership in technology: the four pillars of growth

Reactions 17 Comments
9 min read
Are you a CTO?

Are you a CTO?

Reactions 11 Comments
4 min read
Can UIs and Websites be Microservices?

Can UIs and Websites be Microservices?

Reactions 9 Comments
5 min read
loading...