<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: maerih</title>
    <description>The latest articles on DEV Community by maerih (@maerih).</description>
    <link>https://dev.to/maerih</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F872593%2F1084a291-f656-404c-a309-02eeb3a87934.png</url>
      <title>DEV Community: maerih</title>
      <link>https://dev.to/maerih</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/maerih"/>
    <language>en</language>
    <item>
      <title>Security as a Service.</title>
      <dc:creator>maerih</dc:creator>
      <pubDate>Fri, 10 Jun 2022 22:07:44 +0000</pubDate>
      <link>https://dev.to/maerih/security-as-a-service-kmj</link>
      <guid>https://dev.to/maerih/security-as-a-service-kmj</guid>
      <description>&lt;p&gt;Whether you understand cloud computing or not, if you are savvy enough to use a smartphone or a laptop, chances are you already use cloud computing services. For example, if you have used Amazon.com or any Google Application or Microsoft 365 Suite or even streamed movies and songs online - you have used cloud computing services.&lt;/p&gt;

&lt;p&gt;Microsoft defines cloud computing as the "delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet ("the cloud") to offer faster innovation, flexible resources, and economies of scale. You typically pay only for cloud services you use, helping you lower your operating costs, run your infrastructure more efficiently, and scale as your business needs change." Basically, companies can use the services mentioned above through the internet as opposed to their on-premise server.&lt;/p&gt;

&lt;p&gt;Due to lower operating costs and other efficiency factors, most companies, no matter the size, are quickly migrating to the cloud (Is cloud really Secure?). This has led to many criticalities arising in the management of cloud architecture. Specifically, the security aspect needs utmost attention, mainly in application domains where integrity, privacy, and confidentiality of information must be guaranteed.&lt;br&gt;
What is Security as a Service (SECaaS)?&lt;/p&gt;

&lt;p&gt;Wikipedia describes Security as a Service (SECaas) as a "business model in which a service provider integrates their security services into a corporate infrastructure on a subscription basis." This security as a service is generally more cost-effective than most corporations provide on their own when the total cost of ownership is considered. To understand, consider SECaaS as a SaaS (Software as a Service) model where the service provider offers cybersecurity-focused services to aid with customer's networks and IT systems.&lt;br&gt;
Why You Need Security as a Service (SECaaS)?&lt;/p&gt;

&lt;p&gt;According to IDC's Cloud computing study, 92% of organizations have at least some part of their IT environment as cloud-based. Added to that, more than 55% of the organizations currently use multiple public clouds. The survey also found that Technology decision-makers believed privacy and security challenges to be the major hurdles preventing them from taking full advantage of their public clouds. 'The State of Cloud Security 2020', a survey by Sophos, found almost 2/3rd of the organizations (70%) hosting data/workloads in the public cloud experienced a security incident. Moreover, Multi-cloud organizations reported more security incidents than those using only a single platform.&lt;br&gt;
Types of SECaaS:&lt;/p&gt;

&lt;p&gt;A lot of work has been done regarding the security of the cloud and the data within it. However, there was still a dearth of best practices guidelines to follow during developing and implementing an elastic cloud model. The Cloud Security Alliance (CSA) solved this problem by breaking the SECaaS into various categories:&lt;br&gt;
Identity and Access Management (IAM):&lt;/p&gt;

&lt;p&gt;IAM provides controls for access intelligence, identity verification and access management. It includes processes such as provisioning/de-provisioning of accounts, directory services, authentication, token management etc&lt;br&gt;
THREATS ADDRESSED:&lt;/p&gt;

&lt;p&gt;Identity theft&lt;br&gt;
Unauthorized access&lt;br&gt;
Privilege escalation&lt;br&gt;
Insider threat&lt;br&gt;
Non-repudiation&lt;br&gt;
Excess privileges / excessive access&lt;br&gt;
Delegation of authorizations/entitlements fraud&lt;br&gt;
Data Loss Prevention:&lt;/p&gt;

&lt;p&gt;This is a preventive measure that mainly ensures that data (structured and unstructured) remains under control. It deals with monitoring, protecting, and verifying the security of data in the cloud and on-premises. Its functionalities include- data labeling &amp;amp; classification, identification of sensitive data, Structured data matching, SQL regular expression detection etc.&lt;br&gt;
THREATS ADDRESSED:&lt;/p&gt;

&lt;p&gt;Data loss/leakage&lt;br&gt;
Unauthorized access&lt;br&gt;
Malicious compromises of data integrity&lt;br&gt;
Data sovereignty issues&lt;br&gt;
Regulatory sanctions and fines&lt;br&gt;
Web Security:&lt;/p&gt;

&lt;p&gt;This is a reactive and real-time protection mechanism against online applications offered via the cloud by redirecting web traffic to the cloud provider. It provides services like web filtering, spyware &amp;amp; bot network analyzer, phishing site blocker, email security etc&lt;br&gt;
THREATS ADDRESSED&lt;/p&gt;

&lt;p&gt;Keyloggers&lt;br&gt;
Domain Content&lt;br&gt;
Malware&lt;br&gt;
Spyware&lt;br&gt;
Bot Network&lt;br&gt;
Phishing&lt;br&gt;
Virus&lt;br&gt;
Bandwidth consumption&lt;br&gt;
Data Loss Prevention&lt;br&gt;
Spam&lt;br&gt;
Email Security:&lt;/p&gt;

&lt;p&gt;As the name suggests, email security provides control over inbound and outbound emails, thus helping in enforcing corporate policies. Its functionalities include accurate filtering to block spam, flexible policies to define mail flow, encryption, etc.&lt;br&gt;
THREATS ADDRESSED&lt;/p&gt;

&lt;p&gt;Phishing&lt;br&gt;
Intrusion&lt;br&gt;
Malware&lt;br&gt;
Spam&lt;br&gt;
Address spoofing&lt;br&gt;
Security Assessments:&lt;/p&gt;

&lt;p&gt;These are audits of cloud services or assessments of on-premises systems via cloud-provided solutions generally done by third parties. Some of the features are Risk management, compliance, technical compliance audits, application security assessments etc&lt;br&gt;
THREATS ADDRESSED&lt;/p&gt;

&lt;p&gt;Inaccurate inventory&lt;br&gt;
Lack of continuous monitoring&lt;br&gt;
Lack of correlation information&lt;br&gt;
Lack of complete auditing&lt;br&gt;
Failure to meet/prove adherence to Regulatory/Standards Compliance&lt;br&gt;
Insecure / vulnerable configurations&lt;br&gt;
Insecure architectures&lt;br&gt;
Insecure processes/processes not being followed&lt;br&gt;
Intrusion Management:&lt;/p&gt;

&lt;p&gt;This process uses pattern recognition to detect and react to statistically unusual events to stop/prevent an intrusion in real-time. Generally, it provides identification of intrusions &amp;amp; policy violations, automatic/manual remedy actions, updates to address new vulnerabilities &amp;amp; exploits.&lt;br&gt;
THREATS ADDRESSED&lt;/p&gt;

&lt;p&gt;Intrusion&lt;br&gt;
Malware&lt;br&gt;
Security, Information and Event Management (SIEM):&lt;/p&gt;

&lt;p&gt;This is a detection process in which the systems accept log/event information. This information is then analyzed and is used to report and alert on events that may require intervention. It provides real-time log &amp;amp; event correlation, forensic support, log normalization, compliance reporting etc&lt;br&gt;
THREATS ADDRESSED&lt;/p&gt;

&lt;p&gt;Insecure Interfaces and APIs&lt;br&gt;
Malicious Insiders&lt;br&gt;
Shared Technology Issues&lt;br&gt;
Data Loss and Leakage&lt;br&gt;
Account or Service Hijacking&lt;br&gt;
Unknown Risk Profile&lt;br&gt;
Fraud&lt;br&gt;
Abuse and Nefarious Use&lt;br&gt;
Encryption:&lt;/p&gt;

&lt;p&gt;This process makes the data indecipherable by managing encryptions, hashing, digital signatures, key exchanges etc. Its functionalities include- data protection, data validation, message authentication, data time-stamping, code signing, forgery detection etc&lt;br&gt;
THREATS ADDRESSED&lt;/p&gt;

&lt;p&gt;Failure to meet Regulatory Compliance requirements&lt;br&gt;
Mitigating insider and external threats to data&lt;br&gt;
Intercepted clear text network traffic&lt;br&gt;
Clear text data on stolen/disposed of hardware&lt;br&gt;
Reducing perceived risks&lt;br&gt;
Network Security:&lt;/p&gt;

&lt;p&gt;This refers to various services that help in distributing, managing, and monitoring security controls in a network. The functionalities are traffic/NetFlow monitoring, security monitoring, data threats, access control threats, security gateways, DoS protection/mitigation etc&lt;br&gt;
THREATS ADDRESSED&lt;/p&gt;

&lt;p&gt;Data Threats&lt;br&gt;
Access Control Threats&lt;br&gt;
Application Vulnerabilities&lt;br&gt;
Cloud Platform Threats&lt;br&gt;
Regulatory, Compliance &amp;amp; Law Enforcement&lt;/p&gt;

&lt;p&gt;A hughes systique infographic with benefits of Security as a service(SECaaS)&lt;br&gt;
Benefits of SECaaS&lt;br&gt;
Professional Expertise:&lt;/p&gt;

&lt;p&gt;Many organizations lack domain knowledge or simply struggle to train in-house security professionals for various reasons. SECaaS providers are highly skilled, domain expert technicians who help enterprises enhance their security capabilities.&lt;br&gt;
Knowledge sharing:&lt;/p&gt;

&lt;p&gt;Generally, SECaaS providers will be servicing multiple clients simultaneously. So, when any issue arrives with one client, the remedy for that kind of threat can be used as a preemptive defense strategy for other clients as well.&lt;br&gt;
Deployment flexibility:&lt;/p&gt;

&lt;p&gt;As SECaaS is itself a cloud-native model, it is probably the best suited to handle evolving workplaces and cloud migrations. It can manage flexible deployment models without the complexity of multi-site hardware installations.&lt;br&gt;
Extra layer of protection:&lt;/p&gt;

&lt;p&gt;SECaaS acts as a preventive service to intercept various attacks before they hit the enterprises. For example, it adds an extra layer of Firewall or spam filters between the organization and attackers.&lt;br&gt;
Scaling and cost:&lt;/p&gt;

&lt;p&gt;Flexible cost of the SECaaS services allow enterprises to pay only for the services they use. This helps them concentrate on their core competencies while leaving the security concerns to the experts.&lt;/p&gt;

&lt;p&gt;Since many companies are adopting cloud technologies but are still ill-informed about the security aspect, they need their service providers to look after their Cloud Security needs. There are various cloud security issues such as data breaches, distributed denial of services attacks, phishing scams, etc that SECaaS providers can efficiently address. Also, developing in-house cloud security experts is costly and requires regular upskilling and training of the employees (Importance of Cloud Migration). Partnering with a trusted SECaaS service provider can help organizations focus on their core business area while the partner will help keep their digital assets secure&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Organization Password Best Practices.</title>
      <dc:creator>maerih</dc:creator>
      <pubDate>Fri, 10 Jun 2022 21:58:43 +0000</pubDate>
      <link>https://dev.to/maerih/organization-password-best-practices-h9o</link>
      <guid>https://dev.to/maerih/organization-password-best-practices-h9o</guid>
      <description>&lt;p&gt;OPBP Best Practices&lt;/p&gt;

&lt;p&gt;Remote working has impacted the world of cybersecurity in multiple ways. Remote workers are often not protected by enterprise-level security and so are more prone to cyberattack. The FBI reported a 300% increase in cybercrimes since the pandemic began, and remote work has increased the average cost of a data breach substantially.&lt;/p&gt;

&lt;p&gt;Employees working from home are also distracted –&lt;/p&gt;

&lt;p&gt;“47% of remote workers cited distraction as the reason for falling for a cyberattack.”&lt;/p&gt;

&lt;p&gt;In other words, if you do not have a plan in place to mitigate these risks, you are setting yourself up for a potentially devastating cybersecurity breach.&lt;/p&gt;

&lt;p&gt;One simple way to protect your organization from breaches is to apply a strong password policy at all levels of the organization, and enforce it by implementing a secure password policy management solution (PPM).&lt;/p&gt;

&lt;p&gt;Here are some password policy best practices you may find useful.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Increase password length and strength
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Brute force attacks try all possible combinations of characters to arrive at the password. A 6 string password with only upper or lower case letters can be cracked in 8 seconds. An 18 character password with upper and lower case letters, numbers and symbols can take 1 quintillion years to crack! By adding a special character, combining both upper and lower case letters or adding numbers, encryption can be much more secure.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--d0We6TYC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pluidx39n7060zo512s6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--d0We6TYC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pluidx39n7060zo512s6.jpg" alt="Image description" width="612" height="404"&gt;&lt;/a&gt;&lt;br&gt;
The full strength of the Advanced Encryption Standard (AES) comes to bear when users create passwords of 32 characters for 128-bit encryption and 64 characters for 256-bit encryption. However, passwords of around 10 characters are strong enough for most applications.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Simplify as much as possible
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;A password made of only numbers has 10 options for each character in the string, one made of numbers and letters has 36 options, and if you include special characters that adds another 32 possible characters for each spot in the string. This makes it more challenging for brute force attacks to be successful. Complexity in terms of the kind of characters that can be used in the password is, therefore, an advantage.&lt;/p&gt;

&lt;p&gt;However, do not mandate the usage of these different kinds of characters. This can lead to frustration and reuse of the same password with minor character substitutions (P@ssword or Passw0rd, for example). This is especially the case when the policy also demands frequent changes of password. If the old password is compromised, such minor variations will be relatively easy to guess, too.&lt;/p&gt;

&lt;p&gt;To mitigate this risk, don’t mandate the use of special characters and reduce the frequency of mandatory password reset to approximately once a year. A long password using only lowercase letters is more secure than a short one which is a variant of an older password.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Do not allow password reuse
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Do not allow reuse of earlier passwords during periodic password reset to increase security. Train your staff not to use minor variations of their earlier passwords, and instead look for completely different passwords.&lt;/p&gt;

&lt;p&gt;Also train staff on the risks of reusing passwords across home and work accounts. Password reuse results in a huge surge in credential stuffing attacks. If any service is compromised and your password and username are stolen, hackers could use the same credentials to try and hack your other accounts. Each account must therefore use unique credentials to maintain security.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Reinforce passwords using multi-factor authentication (MFA)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Multi-factor authentication uses a combination of things you know, such as a password or PIN; things you have, such as a badge or smartphone; and things you are, such as biometric data, to authenticate your right to access a particular system, data or application.&lt;/p&gt;

&lt;p&gt;Enabling MFA ensures that even if a password is stolen, the system is not compromised.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Use a secure password manager
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Many users find it difficult to remember their passwords for multiple online services, and so either use a single password for all, or, worse, save all their passwords to an unreliable password manager.&lt;/p&gt;

&lt;p&gt;If you do opt for a password manager, choose one that is highly secure, in order to mitigate the risk involved. Most IAM solutions will include a password manager or, with Single Sign-on, completely do away with the need for multiple passwords. A single secure password is enough to log on to your IAM and access your applications and data.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Use an IAM application for Password Policy Management (PPM)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;It’s one thing to lay down rules for password policy across the organization. It’s quite another to enforce the policy. An Identity Access Management (IAM) application can help you ensure that all your users consistently comply with a high standard of security while setting their passwords, without the need for a separate password policy enforcement tool.&lt;/p&gt;

&lt;p&gt;Administrators can customize and define password policy for all users in the organization. You can also specify upon whom the policy should be enforced, based on the users’ access level. Password policies can of course also be defined as blanket rules.&lt;/p&gt;

&lt;p&gt;A common perception is that the risks associated with breached passwords do not apply to your organization as you have secure systems. But your organization’s data security is only as strong as the weakest password of your users. In 2020, 770 million credential stuffing attacks occurred. That means that if your employee’s personal passwords are compromised, and they have reused the same password at work, your data is compromised too. Worse, 17% of all sensitive files are accessible to all employees, and about 60% of companies have over 500 accounts with non-expiring passwords.&lt;/p&gt;

&lt;p&gt;Implementing a robust Identity and Access Management (IAM) solution brings you several steps closer to protecting your user credentials and corporate data. Worldwide, cybercrime costs will hit $6 trillion annually this year. Don’t let your organization succumb to a Data breach! With these simple steps, you can stay safe with multiple layers of data protection. Allow our team at Akku to help you secure your systems.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>What is PWA.</title>
      <dc:creator>maerih</dc:creator>
      <pubDate>Fri, 10 Jun 2022 21:36:41 +0000</pubDate>
      <link>https://dev.to/maerih/what-is-pwa-4h03</link>
      <guid>https://dev.to/maerih/what-is-pwa-4h03</guid>
      <description>&lt;p&gt;Have you ever wondered how you can convert your webpage to an app that can run on a mobile phone no matter its Android or iOS?&lt;/p&gt;

&lt;p&gt;Or have you seen that little + (plus) icon at the top of a website, and it makes you wonder how this website is installable? Well, PWA is the answer to your questions.&lt;br&gt;
What is PWA?&lt;/p&gt;

&lt;p&gt;PWA's or Progressive Web Apps are a hybrid or say a mix of your regular websites or web pages and a mobile application; they provide you the power of both worlds. And PWA's are getting quite popular these days a significant reason being you don't need to learn another language like Kotlin or flutter to build a mobile app for your product, you can convert your existing website into a mobile application. You can even submit to Google Play and App store.&lt;br&gt;
Of course, you can't compete with a language specifically designed for mobile apps, but still, PWA's come in handy a lot of time, you don't have to code separately for android, ios and browsers.&lt;br&gt;
PWA's have access to all native app features like local storage, cache, push notifications, offline access, and a lot of cool features, so if all this gets you excited, let's dive deeper into it.&lt;br&gt;
Benefits of PWA&lt;br&gt;
Cross Platform Support&lt;/p&gt;

&lt;p&gt;PWA is browser build and not os build so it can run on any machine, whether it is Android, ios, or your laptop.&lt;br&gt;
Speed&lt;/p&gt;

&lt;p&gt;PWA is quite faster compared to your standard websites because of the use of service workers, which helps to store the contents of the website in the form of cache on the first time load, making all your further loads significantly faster.&lt;br&gt;
Offline Mode&lt;/p&gt;

&lt;p&gt;That's the biggest feature standard websites lack, but through the use of service workers, you can load an offline version of your app, or you can cache the data for the first time and provide it for the later loads giving a better user experience.&lt;br&gt;
SEO Friendly&lt;/p&gt;

&lt;p&gt;In simple words, SEO is a way to make your websites get ranked higher in the search page results, e.g., Google. So, because PWA is technically a website, its content can get indexed and are discoverable on search engines, and because of this, your app can reach a broader audience.&lt;br&gt;
Low cost of development&lt;/p&gt;

&lt;p&gt;You don't need to hire a web developer and an app developer separately for your project, and you can convert your existing website to a PWA in no time.&lt;/p&gt;

&lt;p&gt;And a lot of others.&lt;/p&gt;

&lt;p&gt;Yes, there are quite a few disadvantages of using a PWA like the browser compatibility issues and the inability to control all features of mobile phones fully, but still, its plus points kind of pay off for all its costs.&lt;/p&gt;

&lt;p&gt;Okay, So enough talk now, let's see what the things that make up a PWA are.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;A manifest.json file: This is a JSON file which contains all the information about how your app will look, which initial page to load when your app starts, all the icons which the app should use and it also tells the browser that it's a PWA and how it should behave after being installed.

A service worker: A service worker is just a javascript file that runs as soon as your app loads and keeps running in the background. It helps you to control all the network requests, push notifications, cache items, etc.. In short, this script takes care of all the functionality part of your app and thus is the core of any PWA.

A secure HTTPS connection: As, by now, you must have realized PWA's are highly robust, so they only work on trusted connections, to make sure there is no harm to user's data and overall security, and in general to user experience.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;That's it, add these three features to your code, make sure to connect the manifest and service worker file to your HTML. You are good to go. Most browsers detect that your app is a PWA and they give an option of installing it to the home screen when a user visits your site, else you can generate a .apk file for it and publish it to the well known PWA Store or the App Store.&lt;/p&gt;

&lt;p&gt;PWA is a vast topic in itself. There's a lot more to it, but for getting started, these three things are essential, and rest your curiosity will figure it out by itself.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Best Practices of choosing a system.</title>
      <dc:creator>maerih</dc:creator>
      <pubDate>Fri, 10 Jun 2022 21:32:21 +0000</pubDate>
      <link>https://dev.to/maerih/best-practices-of-choosing-a-system-5gl5</link>
      <guid>https://dev.to/maerih/best-practices-of-choosing-a-system-5gl5</guid>
      <description>&lt;p&gt;Preamble&lt;/p&gt;

&lt;p&gt;The browsers only understand JavaScript, however with rise of stuff that we use on browsers e.g. Games, Virtual Reality, Augmented Reality, JavaScript hasn't been able to catch up due to its inherent interpreted nature despite its powerful engines like V8.&lt;/p&gt;

&lt;p&gt;Suppose you have a cool game or software developed in a low-level programming language e.g. C/C++ or a high-level programming language e.g. Java/C#/Rust/Go. With WebAssembly you can run these apps on a browser. Wihout re-writing them in JavaScript.&lt;/p&gt;

&lt;p&gt;Wait, what?&lt;br&gt;
What is WebAssembly?&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;WebAssembly (abbreviated Wasm) is a binary instruction format for a stack-based virtual machine. Wasm is designed as a portable compilation target for programming languages, enabling deployment on the web for client and server applications.

-https://webassembly.org/

WebAssembly, or wasm, is the most significant new technology to come to the web platform in a decade. Technically speaking, it is a new, low-level, assembly-like language that runs efficiently on the existing web platform and is backward-compatible with its precursor, asm.js. Most people, however, will use the wasm format as a compiler target, translating their applications into web-ready modules that can run in modern web browsers at near-native speeds.

-https://research.mozilla.org/webassembly
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;W A S M&lt;/p&gt;

&lt;p&gt;Check out Milica Mihajlija's awesome blog to know more.&lt;br&gt;
Blazor&lt;/p&gt;

&lt;p&gt;Blazor is an open-source framework from Microsoft to develop Component based UIs using language you already know and love, C#. I'll be blunt and say:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;It's Microsoft's response to Angular and React.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Because why not?&lt;/p&gt;

&lt;p&gt;But it's not why we're talking about Blazor here. The reason is, one of the hosting models of Blazor is WebAssembly.&lt;/p&gt;

&lt;p&gt;Blazor's home page says:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Blazor can run your client-side C# code directly in the browser, using WebAssembly. Because it's real .NET running on WebAssembly, you can re-use code and libraries from server-side parts of your application.
-https://dotnet.microsoft.com/apps/aspnet/web-apps/blazor
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
    </item>
    <item>
      <title>Make awesome Portfolio.</title>
      <dc:creator>maerih</dc:creator>
      <pubDate>Fri, 10 Jun 2022 21:27:18 +0000</pubDate>
      <link>https://dev.to/maerih/make-awesome-portfolio-pin</link>
      <guid>https://dev.to/maerih/make-awesome-portfolio-pin</guid>
      <description>&lt;p&gt;Hi ✋😁&lt;br&gt;
I would like to introduce my self,&lt;br&gt;
my name is Maeri&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--uIV6J-JF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3nlh3d95cg2vvxu8wqxr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--uIV6J-JF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3nlh3d95cg2vvxu8wqxr.png" alt="Image description" width="880" height="495"&gt;&lt;/a&gt; and I am a web developer.&lt;/p&gt;

&lt;p&gt;I wrote this article to share my new portfolio.&lt;/p&gt;

&lt;p&gt;I was searching for designs on google for a couple of days, and then I stumbled on a good design that I like. Its a design by Brittany Chiang.&lt;/p&gt;

&lt;p&gt;I built my portfolio based on her design using Vue Js, and with the help of the plugin Vuetify. I tweaked my portfolio a little with the taste that I like.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Introduction to cyber threats.</title>
      <dc:creator>maerih</dc:creator>
      <pubDate>Fri, 10 Jun 2022 21:22:47 +0000</pubDate>
      <link>https://dev.to/maerih/introduction-to-cyber-threats-3jkc</link>
      <guid>https://dev.to/maerih/introduction-to-cyber-threats-3jkc</guid>
      <description>&lt;p&gt;As we are going through unusual and challenging times, our daily habit has been affected in all sorts of ways. For those who are working from home, this is indeed a very difficult time. We are more open to cyber attacks due to the little to no cyber security we have in place while working from home.&lt;/p&gt;

&lt;p&gt;Hackers are desperately trying to exploit the opportunity and up to some extent, it’s working. It’s mainly because many organizations and business tasks have gone from an internal network to the open internet without much preparation. This has exposed them to more potential threats.&lt;/p&gt;

&lt;p&gt;Some of the common attacks are listed below.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Email-Phishing
SMS-Phishing
Mobile Malware
Malicious Software
Ransomware Attacks
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Cyber Security Best Practices For Remote Workers&lt;/p&gt;

&lt;p&gt;In this rising time of cyber attacks, taking preventive action against these interventions is a necessity.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Use antivirus and antispyware software on every computer used in your business and make sure they are frequently updated.
Limit physical access to your computers and network components.
Regularly change passwords and ensure that they’re not easy to predict
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;more detailed version published at &lt;a href="https://beaglesecurity.com/blog/blogs/2020/04/13/Cyber-Security-Threats-and-Best-Practices-for-Remote-Workers.html"&gt;https://beaglesecurity.com/blog/blogs/2020/04/13/Cyber-Security-Threats-and-Best-Practices-for-Remote-Workers.html&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>productivity</category>
    </item>
  </channel>
</rss>
