Ivan NovikovThe Hand-y Etiquette of Modern All-Remote CultureIn today’s fast-paced digital world, remote work has become the new normal. With the rise of video conferencing platforms like Zoom and…2 min read·May 14, 2023----
Ivan NovikovWhat is threat modeling ❓ Definition, Methods, ExampleThreat modeling is a method for upgrading the security of an application, system, or business process by distinguishing objections and…12 min read·Feb 2, 2022----
Ivan NovikovWhat is Cross Site Request Forgery CSRF | Example and Methods of protectionOrganizations aspiring for all-around resource security against the damage-causing cyber vulnerabilities must upgrade their knowledge and…7 min read·Jan 28, 2022----
Ivan NovikovServer side template injection — SSTI vulnerability ⚠️Introduction8 min read·Jan 26, 2022----
Ivan NovikovWhat is XMPP ❓ — Extensible Messaging & Presence ProtocolIntroduction8 min read·Jan 25, 2022----
Ivan NovikovWhat is Cryptojacking Attack ❓ Definition and PreventionIntroduction8 min read·Jan 19, 2022----
Ivan NovikovWhat is API Abuse ❓ Prevention measures.APIs are paramount for constructing a steadfast and constant communication bridge that empowers devices to pass-on desired information…3 min read·Jan 18, 2022----
Ivan NovikovWhat is RAT Remote Access Trojan ❓ Detection and RemovalIntroduction5 min read·Jan 14, 2022----
Ivan NovikovWhat is SAML authentication ❓ How does it work ❓Enterprises using various business apps have a tough time maintaining data’s secrecy and access grants as per user roles throughout the…6 min read·Dec 30, 2021----