Your website is open to attack from a range of third-party components. Fortunately, you can restrict their activities with a robust Content Security Policy.
Ardian Haxha introduces Keybase, a social media service for sending, receiving and sharing encrypted messages.
Ben Dickson discusses four major challenges presented by IoT, from privacy and security to connectivity and compatibility/longevity.
Elio Qoshi looks at why he is hesitant to adopt the IoT or recommend it to consumers — security, quality and transparency concerns.
Failure is a wonderful teacher – as long as it doesn't kill you. CyberCity lets hackers and security experts practice without anyone getting hurt.
Jim Chiodo outlines common mistakes with website privacy policies that could put you at risk of fines or lawsuits.
DK Lynn details how to detect hacked files with SuperScan, a CRON script that tracks site changes and reports any changes to files in an account.
Ian Oxley looks at using CSP to create a whitelist of allowable resource types and locations, to prevent website injection attacks such as XXS.
Craig interviews SitePoint's Jude Aakjaer about the challenges of integrating hardware, software and services into cohesive systems which keep running.
By default, every website is accessible to the whole planet. In this article we show you how to block entire countries, with pros, cons and code samples.
Dhaivat Pandya explains how to use VictorOps' REST endpoint to integrate it with other services, in this case, SalesForce.
Jeroen Meeus explains Access Restriction - ways of blocking direct embeds and hotlinking of your website's content