Skip to main content

Command Palette

Search for a command to run...

HTTP Response Headers: Usage and Security Abuse

Updated
โ€ข1 min read
HTTP Response Headers: Usage and Security Abuse
P

Everything I do professionally is around helping engineers create amazing applications that are both secure and reliable. Thatโ€™s why I build engineering tools and educational content that simplify application security.

Throughout my career, I have performed security audits for private and open-source projects, and have found critical vulnerabilities in Google and Mozilla products. I have also taught security to hundreds of engineers and students, while I have also been an external lecturer and Ph.D. candidate in computer science at the Technical University of Denmark.

Here are some of the things Iโ€™m working on right now:

  • Developing a tool ๐Ÿ› ๏ธ that helps software engineers build applications which comply with privacy requirements
  • Creating weekly educational content on application security using comic art ๐Ÿฆ‡
  • Creating a blog ๐Ÿ“ on security at securingbits.com

If youโ€™re interested in learning more about application security, Iโ€™d love to hear from you. Feel free to send me a message, and make sure to follow me so I can make security easy for you ๐Ÿ™‚

HTTP Response Headers: Usage ๐Ÿ›  and Security Abuse โ˜ .

Those complement the HTTP Request Headers we saw last week :)

More from this blog

Securing Bits

56 posts