Skip to main content
KODCUK iconKODCUK
Blog

Blog

Engineering notes on web delivery, mobile systems, APIs, security, and operational architecture.

Security and AppSec

Authentication, authorization design, audit trails, and application security controls.

Authentication flows: OAuth, JWT, and sessions cover
Security and AppSecJanuary 27, 2026
Technical guidePublished

Authentication flows: OAuth, JWT, and sessions

A practical decision model to reduce technical risk around authentication flows: oauth, jwt, and sessions.

securityapi-security+1

Publish date

January 27, 2026

Details
Translating OWASP Top 10 risks for product teams cover
Security and AppSecJanuary 26, 2026
Technical guidePublished

Translating OWASP Top 10 risks for product teams

A practical decision model to reduce technical risk around translating owasp top 10 risks for product teams.

securityapi-security+1

Publish date

January 26, 2026

Details
Cyber Security Guide: Application, API, and Operational Protection cover
Security and AppSecJanuary 25, 2026
Technical guidePublished

Cyber Security Guide: Application, API, and Operational Protection

A practical guide to embedding security controls from architecture design to live operations.

securityapi-security+1

Publish date

January 25, 2026

Details
Cyber Security Guide: Application, API, and Operational Protection: Common mistakes and mitigations cover
Security and AppSecJanuary 10, 2026
Technical guidePublished

Cyber Security Guide: Application, API, and Operational Protection: Common mistakes and mitigations

A practical guide to embedding security controls from architecture design to live operations. A field-tested mitigation guide for common implementation failures.

securityapi-security+2

Publish date

January 10, 2026

Details
Cyber Security Guide: Application, API, and Operational Protection: Implementation checklist cover
Security and AppSecJanuary 09, 2026
Technical guidePublished

Cyber Security Guide: Application, API, and Operational Protection: Implementation checklist

A practical guide to embedding security controls from architecture design to live operations. A practical pre-release checklist for teams working on this capability area.

securityapi-security+2

Publish date

January 09, 2026

Details
24-hour action plan for security incident response cover
Security and AppSecJanuary 08, 2026
Technical guidePublished

24-hour action plan for security incident response

A practical decision model to reduce technical risk around 24-hour action plan for security incident response.

securityapi-security+1

Publish date

January 08, 2026

Details
Attack-surface reduction checklist cover
Security and AppSecJanuary 07, 2026
Technical guidePublished

Attack-surface reduction checklist

A practical decision model to reduce technical risk around attack-surface reduction checklist.

securityapi-security+1

Publish date

January 07, 2026

Details
Turning penetration test findings into delivery backlog cover
Security and AppSecJanuary 06, 2026
Technical guidePublished

Turning penetration test findings into delivery backlog

A practical decision model to reduce technical risk around turning penetration test findings into delivery backlog.

securityapi-security+1

Publish date

January 06, 2026

Details
Designing security logs for SIEM readiness cover
Security and AppSecJanuary 05, 2026
Technical guidePublished

Designing security logs for SIEM readiness

A practical decision model to reduce technical risk around designing security logs for siem readiness.

securityapi-security+1

Publish date

January 05, 2026

Details
Encryption strategy for data at rest and in transit cover
Security and AppSecJanuary 04, 2026
Technical guidePublished

Encryption strategy for data at rest and in transit

A practical decision model to reduce technical risk around encryption strategy for data at rest and in transit.

securityapi-security+1

Publish date

January 04, 2026

Details
Input validation patterns to prevent injection classes cover
Security and AppSecJanuary 03, 2026
Technical guidePublished

Input validation patterns to prevent injection classes

A practical decision model to reduce technical risk around input validation patterns to prevent injection classes.

securityapi-security+1

Publish date

January 03, 2026

Details
API security with mTLS, key rotation, and audit trails cover
Security and AppSecJanuary 02, 2026
Technical guidePublished

API security with mTLS, key rotation, and audit trails

A practical decision model to reduce technical risk around api security with mtls, key rotation, and audit trails.

securityapi-security+1

Publish date

January 02, 2026

Details
+Start a ProjectChat on WhatsApp