Securing your secrets in AWSSecrets and credentials are everywhere, we use them to access third party systems. Securing secrets and protecting our credentials and…Jul 24Jul 24
Published inAuthressHow does machine to machine authentication work?Machine to machine auth is how you ensure secure communication between individual services, and each service can authorize others to access…Dec 6, 20231Dec 6, 20231
Published inStandup & ProsperThe Devastating Failure of Technical LeadershipI’m going to tell you a story, one that may even have happened to you. The sad truth is this a very common story, and it starts with…Jul 10, 2023Jul 10, 2023
Published inAuthressAuthress Academy: Denylists and Invaliding user accessThis article is part of the Authress Academy and discusses the different ways to invalidate a user’s access and revoke their tokens.Jul 5, 2023Jul 5, 2023
Myths about API HTTP clientsHaving built many Product APIs in my experience for multiple companies, there are a number of Myths we’ve come to learn about APIs in…Jun 29, 2023Jun 29, 2023
You are probably testing wrongI love having to answer the questions that come up regarding testing. It’s amazing that something that is pure waste according to lean for…Feb 2, 2023Feb 2, 2023
Published inAuthressBreaking up the monolith: Breaking changesBefore we get into how to handle a breaking change, we should first identify what is even a breaking change.Aug 5, 2022Aug 5, 2022
Published inStandup & ProsperMeasuring team successIt should be a inevitable conclusion that you to need to measure the success of your teams. After all, we get what we measure. And having…Jun 28, 2022Jun 28, 2022
Published inStandup & ProsperThe Required team meetingsThere is no shortage of advice out there on knowing when to call a meeting. And in the remote-first world async communication is now the…Jun 24, 20221Jun 24, 20221