Forem

π™‘π™–π™£π™šπ™¨π™¨π™– π™ˆπ™–π™™π™žπ™¨π™€π™£ profile picture

π™‘π™–π™£π™šπ™¨π™¨π™– π™ˆπ™–π™™π™žπ™¨π™€π™£

Engineer focused on cloud security, automation, and secure architecture.

Location Denver, Colorado Joined Joined onΒ  Personal website https://vanesssamadison.com

Work

Founder of ILLAPEX

Security-First WebSockets: Protecting Real-Time Communications
Cover image for Security-First WebSockets: Protecting Real-Time Communications

Security-First WebSockets: Protecting Real-Time Communications

2
Comments 1
2 min read
Authentication Flows: Implementing Secure Session Management
Cover image for Authentication Flows: Implementing Secure Session Management

Authentication Flows: Implementing Secure Session Management

Comments
2 min read
Secrets Management: Keeping API Keys and Credentials Safe
Cover image for Secrets Management: Keeping API Keys and Credentials Safe

Secrets Management: Keeping API Keys and Credentials Safe

4
Comments
2 min read
GraphQL Security: Protecting Queries and Mutations
Cover image for GraphQL Security: Protecting Queries and Mutations

GraphQL Security: Protecting Queries and Mutations

Comments
2 min read
Database Security Patterns for Web Applications
Cover image for Database Security Patterns for Web Applications

Database Security Patterns for Web Applications

Comments
2 min read
AWS Security Best Practices for Production Applications
Cover image for AWS Security Best Practices for Production Applications

AWS Security Best Practices for Production Applications

Comments
2 min read
Implementing Zero-Trust Architecture in Node.js Applications
Cover image for Implementing Zero-Trust Architecture in Node.js Applications

Implementing Zero-Trust Architecture in Node.js Applications

4
Comments 1
2 min read
React Security Patterns Every Developer Should Know
Cover image for React Security Patterns Every Developer Should Know

React Security Patterns Every Developer Should Know

4
Comments 2
2 min read
loading...