An Introduction to WordPress Security

Recent statistics show that over 28% of website administrators across the web use WordPress. With its popularity comes a price – it is often targeted by malicious hackers and spammers, who seek to leverage insecure websites to their advantage…. Source:

WordPress Security As A Process

Last year, WordPress was responsible for 83% of infected content management sites. Make sure you’re not contributing to those infections and learn how to securely manage WordPress. (This article is kindly sponsored by Sucuri.) WordPress security doesn’t have a good reputation…. Source:

Adding a Body Class Based on a Template

Working with templates in WordPress is something that’s not uncommon. Everything is a template of sorts – from the main page template, single page template, 404 template – all the way to custom templates…. Source:


A bare-bones starter WordPress environment using Docker and Composer. Right now, this just quickly sets up a functional local environment and does not include any starter theme. That’s yet to come. Make sure Docker, Docker Compose, and Composer are installed on your machine…. Source:

Adding Custom Routes to the WordPress REST API

Most of the discussion around the WordPress REST API has been about querying the default routes. In that sense, we’re treating it as a monolithic API—like the Twitter API, for example…. Source:

Introducing the WP REST API

In the current part of the introductory series to the WP REST API, we will learn to create, update, and delete data using the WP REST API. We will also learn…… Source:–cms-896

Get post by slug

Skip to content You can’t perform that action at this time. You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session…. Source:

WP REST API: Retrieving Data

In the previous parts of the series, we have been looking at what the WP REST API is and how it can help us build better applications using the WordPress back end.  Then we looked at two ways to set up authentication on the server for generating authenticated requests…. Source:–cms-24694