Can string comparison realistically be exploited in a timing attack on a web server?

Suppose you have the following code in Node:

const { token } = req.body
const hash = crypto.createHmac(‘sha256’, SECRET).update(token).digest(‘hex’)
const user = await User.findById(req.session.userId)

if (hash === user.rem… Continue reading Can string comparison realistically be exploited in a timing attack on a web server?

When Deserializing a User in Passport is there any reason not to remove Secrets?

I am using the passport-local passport strategy, but in general I have a few questions (sorry for the length). They might be very novice questions so I apologize in advance, but please criticize every aspect of my question an… Continue reading When Deserializing a User in Passport is there any reason not to remove Secrets?

Container usage has grown in complexity, specific security controls are needed

Container usage has grown in scale and complexity, and doubled in density, according to Sysdig. As container technologies continue to transform how organizations deliver applications, it is important for enterprises to understand how to securely operat… Continue reading Container usage has grown in complexity, specific security controls are needed