Artwork

Innhold levert av HackerNoon. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av HackerNoon eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

What I Learned from Scanning Dozens of Small Government Websites (and Why the Same Bugs Keep Coming)

9:27
 
Del
 

Manage episode 524540643 series 3474671
Innhold levert av HackerNoon. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av HackerNoon eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

This story was originally published on HackerNoon at: https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming.
What I found while scanning dozens of small U.S. government websites with an open-source tool — the same five security mistakes and how to fix them.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #web-security, #cybersecurity, #govtech-user-experience, #govtech, #opensource, #webdev, #devops, #legacy-cms, and more.
This story was written by: @civicmeshflow. Learn more about this writer by checking @civicmeshflow's about page, and for more stories, please visit hackernoon.com.
I built an open-source scanner and pointed it at small U.S. government websites. The same five security mistakes kept showing up: weak HTTPS, no CSP, leaky test files, insecure cookies and outdated JS – plus a simple baseline to fix them.

  continue reading

277 episoder

Artwork
iconDel
 
Manage episode 524540643 series 3474671
Innhold levert av HackerNoon. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av HackerNoon eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

This story was originally published on HackerNoon at: https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming.
What I found while scanning dozens of small U.S. government websites with an open-source tool — the same five security mistakes and how to fix them.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #web-security, #cybersecurity, #govtech-user-experience, #govtech, #opensource, #webdev, #devops, #legacy-cms, and more.
This story was written by: @civicmeshflow. Learn more about this writer by checking @civicmeshflow's about page, and for more stories, please visit hackernoon.com.
I built an open-source scanner and pointed it at small U.S. government websites. The same five security mistakes kept showing up: weak HTTPS, no CSP, leaky test files, insecure cookies and outdated JS – plus a simple baseline to fix them.

  continue reading

277 episoder

सभी एपिसोड

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2025 | Personvern | Vilkår for bruk | | opphavsrett
Lytt til dette showet mens du utforsker
Spill