DEV Community

Warren Parad profile picture

Warren Parad

Long time software architect, CTO Authress, creating application security plug-ins for any software application with Authress. Talk to me about security in microservices or service authorization.

Location Switzerland Joined Joined on  Personal website https://authress.io github website twitter website

Work

CTO @Authress

Writing Debut
Five Year Club
Four Year Club
1 Week Community Wellness Streak
Three Year Club
Beloved Comment
Two Year Club
One Year Club
4 Week Writing Streak
How does machine to machine authentication work?

How does machine to machine authentication work?

9
Comments
11 min read

Want to connect with Warren Parad?

Create an account to connect with Warren Parad. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
AWS Advanced: Serverless Prometheus in Action

AWS Advanced: Serverless Prometheus in Action

13
Comments
12 min read
AWS Metrics: Advanced

AWS Metrics: Advanced

15
Comments
10 min read
AWS VPC: Private Subnets Increase Risk

AWS VPC: Private Subnets Increase Risk

13
Comments
6 min read
Marketing your Product effectively

Marketing your Product effectively

Comments
2 min read
The Devastating Failure of Technical Leadership

The Devastating Failure of Technical Leadership

17
Comments
10 min read
Denylists and Invaliding user access

Denylists and Invaliding user access

12
Comments 2
11 min read
Myths about API HTTP clients

Myths about API HTTP clients

11
Comments
6 min read
You are probably testing wrong

You are probably testing wrong

13
Comments
11 min read
Breaking up the monolith: Breaking changes

Breaking up the monolith: Breaking changes

25
Comments
11 min read
Measuring team success

Measuring team success

10
Comments
10 min read
The Required team meetings

The Required team meetings

9
Comments
11 min read
AWS CloudWatch: How to scale your logging infrastructure

AWS CloudWatch: How to scale your logging infrastructure

9
Comments
8 min read
Step-up authorization

Step-up authorization

13
Comments
6 min read
Breaking up the monolith: Zero downtime migrations

Breaking up the monolith: Zero downtime migrations

13
Comments
4 min read
Adding Custom Domains to your SaaS

Adding Custom Domains to your SaaS

27
Comments 13
6 min read
AWS Cognito: Don’t go to production

AWS Cognito: Don’t go to production

23
Comments
7 min read
My DNS doesn't work

My DNS doesn't work

19
Comments
4 min read
AWS Step Functions: Advanced

AWS Step Functions: Advanced

17
Comments
10 min read
I got a CORS error, now what?

I got a CORS error, now what?

18
Comments
5 min read
Breaking up the monolith: Magic identifiers

Breaking up the monolith: Magic identifiers

13
Comments
8 min read
Can’t connect to service running in EC2

Can’t connect to service running in EC2

14
Comments
4 min read
When to use AWS Credentials

When to use AWS Credentials

23
Comments
5 min read
The Punishment of Building a Slack App

The Punishment of Building a Slack App

16
Comments
16 min read
JWT access token misconceptions

JWT access token misconceptions

15
Comments
6 min read
AWS + Gitlab — Leveling up security of your CICD platform.

AWS + Gitlab — Leveling up security of your CICD platform.

15
Comments
4 min read
Creating resources in custom AWS accounts

Creating resources in custom AWS accounts

14
Comments
2 min read
AWS DynamoDB: Single or Multitable

AWS DynamoDB: Single or Multitable

14
Comments
1 min read
To message bus or not to message bus

To message bus or not to message bus

12
Comments
6 min read
Making an infinite CSS carousel

Making an infinite CSS carousel

71
Comments
4 min read
Security for deleting resources

Security for deleting resources

13
Comments
4 min read
The Wolf Pack Team

The Wolf Pack Team

15
Comments
3 min read
Things that are wrong with Terraform

Things that are wrong with Terraform

12
Comments
3 min read
Breach — Enabling emergency data protection

Breach — Enabling emergency data protection

12
Comments
6 min read
Promotion in Action: What everyone should know to get to the next level

Promotion in Action: What everyone should know to get to the next level

13
Comments
8 min read
API Authentication :  Creating service client API keys

API Authentication :  Creating service client API keys

17
Comments 1
3 min read
Setup user authentication with any identity provider

Setup user authentication with any identity provider

14
Comments
3 min read
Validating JWTs in Web APIs

Validating JWTs in Web APIs

17
Comments
2 min read
Choosing the right access control strategy

Choosing the right access control strategy

14
Comments
7 min read
Creating the right environment

Creating the right environment

9
Comments
9 min read
How to secure a multitenant application architecture

How to secure a multitenant application architecture

22
Comments
4 min read
Choosing the right error code 401, 403, or 404

Choosing the right error code 401, 403, or 404

12
Comments 1
4 min read
Zoombombing — a case study of data protection

Zoombombing — a case study of data protection

15
Comments
8 min read
7 Steps to Web Application Security

7 Steps to Web Application Security

17
Comments
6 min read
Hacking your Product Support Strategy

Hacking your Product Support Strategy

24
Comments
11 min read
Initramfs: Dropping to a Shell

Initramfs: Dropping to a Shell

11
Comments 1
4 min read
AWS Free Tier Cost

AWS Free Tier Cost

18
Comments
3 min read
X-Ray in Lamba

X-Ray in Lamba

18
Comments
5 min read
Javascript private fields are coming

Javascript private fields are coming

18
Comments 5
2 min read
Leadership in technology: the four pillars of growth

Leadership in technology: the four pillars of growth

21
Comments
9 min read
Are you a CTO?

Are you a CTO?

14
Comments
4 min read
Can UIs and Websites be Microservices?

Can UIs and Websites be Microservices?

12
Comments
5 min read
loading...