Search


Identification, Authentication and Kenny Loggins and Logouts: What I’ve Learned On My Journey Into Application Security
“Previously known as Broken Authentication , this category slid down from the second position and now includes Common Weakness Enumerations (CWEs) related to identification failures.” ( OWASP ) Kenny Loggins is a famous singer and songwriter spanning multiple decades. If you’re not familiar with his work, just think of Footloose, Caddyshack, or Top Gun, just to name a few. I celebrate his entire collection. Let’s briefly review the basics of identification and authentication.
Jen C
Oct 6, 20253 min read
AI: Your Robot Sidekick—Now Fetching Coffee and Brainstorming Brilliant Ideas
Some of you may be using Artificial Intelligence (AI) at work or in your personal life. It’s great, isn’t it?! We work faster by enhancing our productivity! We’re more creative! We can get access to real-time information super-fast! I don’t mean to scare you, but with all good things, risks are also involved. Let’s explore how to use AI safely and be smart about it. AI clearly saves time. It can assist with research and analysis. It can help generate content quick
Jen C
Oct 6, 20252 min read


The Universe Works In Mysterious Ways…
https://medium.com/@jencracchiola/the-universe-works-in-mysterious-ways-7095ece9c9be The day my brother proposed to his girlfriend was...
Jen C
Aug 9, 20244 min read


Insufficient Transport Layer Protection Vulnerabilities: YouDown With ITLP? (Yeah you know me!)
Quick, name that hip hop group! (OK, that might not have been the exact song lyrics, but some of you may have gotten it.) What is an Insufficient Transport Layer Protection Vulnerability? This is a security weakness that happens when applications do not protect network traffic, which can lead to sensitive data being exposed, intercepted, and used to steal information. The lack of protection can occur due to a number of reasons, such as the use of weak encryption algorithms o
Jen C
Dec 19, 20253 min read


Applying Data Protection in Our Applications
Under my umbrella, -ella, -ella, -eh, -eh, -eh Securing sensitive data stored and transmitted within our applications is a significant concern. To address this, we need robust encryption, strong access controls, and a thorough understanding of data protection techniques. In this article, we'll explore the importance of using data protection in our applications. “With Little Miss Sunshine, Rihanna, Where you at?" An Umbrella Analogy An umbrella and data protection both act
Jen C
Dec 18, 20253 min read