Security breach nocode

Authentication: know who is who!

A public available website often has no authentication or even so called anonymous access. Well if there are no cookies, all information is public, then indeed. But in most cases the information is not public, and is even often linked...

Authentication mechanism

Authorization: who can DO WHAT?

Having a good understanding and effective implementation of authorization is paramount to have adequate control over your information. We will discuss some key principles, threats and what you can do to prevent these threats to materialize. Knowing who interacts with...