Devpler

More articles

Secure software development using zero trust

Zero trust is often discussed in terms of networks, devices, and infrastructure because these are usually the first line of defense against external threats. However, as modern software development moves toward microservices, APIs, infrastructure-as-code and cloud architectures, the boundaries between infrastructure and applications are blurring. Here I provide a brief
Oct 22, 2024 3 min read

Send cyber junk to your Pi-hole: Protect your home network

In today's world of digital advertisements, telemetry, and data collection, Pi-hole provides a layer of protection to your home network. It's simple to set up, consumes little resources, and requires no maintenance. What is Pi-hole? Pi-hole is an open source software application that runs on a
Oct 21, 2024 3 min read

About

Devpler

Insights on coding, cybersecurity, and digital privacy

Topics

Devpler © 2025