Security
- TLS, PKI, and Secure Protocols: How Encrypted Web Traffic Works
· 2025-11-18
A deep technical guide to TLS, certificate validation, key exchange, record protection, modern cipher suites, TLS 1.3, QUIC, and practical deployment best practices for secure networked applications.
- Software Supply Chain Security: SBOMs, Sigstore, Reproducible Builds, and Attestation
· 2022-04-19
An in-depth guide to securing the software supply chain: SBOMs, provenance, Sigstore, SLSA, reproducible builds, code signing, and operational best practices.