Using Docker When Developing a Web Service: What Do You Need To Consider?
In this article, we describe scenarios where we apply Docker to handle continuous integration/continuous development for a Django web service
In this article, we describe scenarios where we apply Docker to handle continuous integration/continuous development for a Django web service
Is it possible to build a transparent SSL proxy on a regular PC?
This article may be useful for security administrators and DevSecOps who are looking for alternative ways of detecting network intrusions and suspicio...
The article might be useful for SaaS providers and web developers who want to protect their applications against upcoming password guessing attacks ba...
What are MITM attacks and how to protect against them?
This article provides recommendations on how to secure your chat or other message exchange protocol using popular and reliable cryptographic algorithm...
Article provides an overview of connected toy vulnerabilities and contains recommendations for developers on how to ensure that IoT toys are protected...
In this article, we share our experience developing a VR video app for Oculus Gear VR. We also discuss key problems that developers may face while wor...
This article covers specifics of fileless malware and provides tips for effectively detecting and protecting against such attacks
In this part of the Rust Language Tutorial, weโll tell you about pattern matching, automatically deducing types using type inference, and ensuring m...
Tell us about your project
Send us a request for proposal! Weโll get back to you with details and estimations.
Book an Exploratory Call
Do not have any specific task for us in mind but our skills seem interesting?
Get a quick Apriorit intro to better understand our team capabilities.
Book time slotContact us