Skip to main content
KODCUK iconKODCUK
Blog

Blog

Notes on architecture, security, and product engineering.

Security and AppSec

Authentication, authorization design, audit trails, and application security controls.

Authentication flows: OAuth, JWT, and sessions cover

Authentication flows: OAuth, JWT, and sessions

A practical decision model to reduce technical risk around authentication flows: oauth, jwt, and sessions.

Security and AppSec

Published: 2026-01-27

Details
Translating OWASP Top 10 risks for product teams cover

Translating OWASP Top 10 risks for product teams

A practical decision model to reduce technical risk around translating owasp top 10 risks for product teams.

Security and AppSec

Published: 2026-01-26

Details
Cyber Security Guide: Application, API, and Operational Protection cover

Cyber Security Guide: Application, API, and Operational Protection

A practical guide to embedding security controls from architecture design to live operations.

Security and AppSec

Published: 2026-01-25

Details
Cyber Security Guide: Application, API, and Operational Protection: Common mistakes and mitigations cover

Cyber Security Guide: Application, API, and Operational Protection: Common mistakes and mitigations

A practical guide to embedding security controls from architecture design to live operations. A field-tested mitigation guide for common implementation failures.

Security and AppSec

Published: 2026-01-10

Details
Cyber Security Guide: Application, API, and Operational Protection: Implementation checklist cover

Cyber Security Guide: Application, API, and Operational Protection: Implementation checklist

A practical guide to embedding security controls from architecture design to live operations. A practical pre-release checklist for teams working on this capability area.

Security and AppSec

Published: 2026-01-09

Details
24-hour action plan for security incident response cover

24-hour action plan for security incident response

A practical decision model to reduce technical risk around 24-hour action plan for security incident response.

Security and AppSec

Published: 2026-01-08

Details
Attack-surface reduction checklist cover

Attack-surface reduction checklist

A practical decision model to reduce technical risk around attack-surface reduction checklist.

Security and AppSec

Published: 2026-01-07

Details
Turning penetration test findings into delivery backlog cover

Turning penetration test findings into delivery backlog

A practical decision model to reduce technical risk around turning penetration test findings into delivery backlog.

Security and AppSec

Published: 2026-01-06

Details
Designing security logs for SIEM readiness cover

Designing security logs for SIEM readiness

A practical decision model to reduce technical risk around designing security logs for siem readiness.

Security and AppSec

Published: 2026-01-05

Details
Encryption strategy for data at rest and in transit cover

Encryption strategy for data at rest and in transit

A practical decision model to reduce technical risk around encryption strategy for data at rest and in transit.

Security and AppSec

Published: 2026-01-04

Details
Input validation patterns to prevent injection classes cover

Input validation patterns to prevent injection classes

A practical decision model to reduce technical risk around input validation patterns to prevent injection classes.

Security and AppSec

Published: 2026-01-03

Details
API security with mTLS, key rotation, and audit trails cover

API security with mTLS, key rotation, and audit trails

A practical decision model to reduce technical risk around api security with mtls, key rotation, and audit trails.

Security and AppSec

Published: 2026-01-02

Details
Chat on WhatsApp