CI/CD – How to Use GitHub Actions to Build Pipelines? – Part 1
About CI/CD and how to use GitHub’s native CI/CD solution - GitHub Actions? What pipelines are and how they can be used to automate the deployment of your application?
The best practices in programming, a handful of code and the latest trends, tips and innovations in the IT world
CI/CD – How to Use GitHub Actions to Build Pipelines? – Part 1
About CI/CD and how to use GitHub’s native CI/CD solution - GitHub Actions? What pipelines are and how they can be used to automate the deployment of your application?
AdministrationProgrammingSecurity
DevSecOps – How to Ensure Application Security within the DevOps Process
How to ensure product security within the DevOps process? What SAST, DAST, and SCA are? How they can contribute to improving security?
AdministrationSecurity
User Identity and Access Management – What’s the Deal with IDP?
What user identity is? Why managing access is essential for businesses? How an IDP (Identity Provider) works? You will find the answer to these questions in the article.
Security
Blockchain – Payments in the World of Cryptocurrencies
Blockchain - discover the world of transactions, cryptocurrencies, and electronic payments.
FinancialSecurity
Netflix as an example of distributed system architecture.
AdministrationSecurity
Low-level operation of encryption algorithms - what are LSFR registers and where stream ciphers are used.
Security
Cryptography – hash functions, hashes and passwords (part 2)
Passwords and their security on the Internet.
Security
Cryptography – hash functions and passwords (part 1)
Cryptography - discover the secrets of hash functions, hashes and passwords.
Security
Cryptography – randomness in cybersecurity
What is randomness, how to properly estimate it, and how important is it in the field of cryptography.
Security
Cryptography – basic concepts and definitions
Discover encryption, decryption, and hashing while gaining professional knowledge from our cryptography series
Security
Authentication, Second Factor, and Session Hijacking
What is authentication, what is the second factor and what options do we have to confirm the user's identity
Security
Ransomware – What It Is and How It Can Impact Your Company? (part 2)
Real cases of attacks and good defense practices in cyberspace
Security
Ransomware – What It Is and How It Can Impact Your Company? (part 1)
Threats and good practices for counteracting ransomware
Security
Improve your online security with Innokrea – don’t let yourself be robbed (part 4)
The last episode of the cybersecurity series
Security