ContentPosts from @cchiruka2..
Link
@faun shared a link, 2 years, 7 months ago
FAUN.dev()

Intelligence Insights: April 2023

CrowdStrike's recent report reveals that the Labyrinth Chollima threat moved up in rank, with a significant increase in activity. The report also highlights a supply chain compromise involving malicious code in a softphone application. Defender preparation, detection, and response are key to reducin.. read more  

Intelligence Insights: April 2023
Link
@faun shared a link, 2 years, 7 months ago
FAUN.dev()

AWS KMS Threat Model

AWS KMS offers different options for key management; letting AWS manage the key is a common query, however. AWS offers three options for encryption: their own manage key (transparently), AWS key management with limited control or customer-managed key (CMK)... read more  

AWS KMS Threat Model
Link
@faun shared a link, 2 years, 7 months ago
FAUN.dev()

The Dark Side of DevSecOps and the case for Governance Engineering

DevSecOps pipelines and golden paths secure the software delivery pipeline but not the entire development lifecycle. Monitoring production and implementing Governance Engineering can detect unauthorized changes, ensure compliance, and mitigate risks for a more secure DevOps environment... read more  

The Dark Side of DevSecOps and the case for Governance Engineering
Link
@faun shared a link, 2 years, 7 months ago
FAUN.dev()

Fingerprinting pfSense using GitHub analysis

Penetration testers use GitHub repositories to find vulnerabilities in open source applications. They analyzed the pfSense repository to determine the version of the target application. They wrote scripts to retrieve directory contents and compare files across different versions, saving the results .. read more  

Fingerprinting pfSense using GitHub analysis
Link
@faun shared a link, 2 years, 7 months ago
FAUN.dev()

How to Perform a Network Security Risk Assessment

Ensuring network security: The importance of conducting a comprehensive network security risk assessment to safeguard against cyberattacks, address vulnerabilities, and build trust with stakeholders and customers... read more  

How to Perform a Network Security Risk Assessment
Link
@faun shared a link, 2 years, 7 months ago
FAUN.dev()

What to Look for When Selecting a Static Application Security Testing (SAST) Solution

Discover how to choose the right vulnerability scanning product for your business and get started with vulnerability scanning... read more  

What to Look for When Selecting a Static Application Security Testing (SAST) Solution
Link
@faun shared a link, 2 years, 7 months ago
FAUN.dev()

What is SaaS Security? - Types, Challenges, Threats & Protection Guide

SaaS security protects data and applications in cloud environments. It includes data protection, access controls, infrastructure security, application security, incident response, and compliance. Organizations should choose reputable providers, implement encryption and strong authentication, monito.. read more  

What is SaaS Security? - Types, Challenges, Threats & Protection Guide
Link
@faun shared a link, 2 years, 7 months ago
FAUN.dev()

Integrating DAST Into Your CI/CD Pipeline: Benefits and Implementation

Integrating Dynamic Application Security Testing (DAST) into your CI/CD pipeline helps detect web application vulnerabilities early, improves security, speeds up time-to-market, and reduces costs. Choose the right DAST tool, start early in the development process, schedule regular scans, prioritize .. read more  

Link
@faun shared a link, 2 years, 7 months ago
FAUN.dev()

Exploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelines

The author experimented with running isolated CI/CD pipelines using Firecracker microVMs for improved security. They set up the infrastructure, compiled a custom kernel, built a rootfs, enabled internet access, launched the microVM, and ran a sample pipeline using the Dagger engine... read more  

Exploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelines
Story
@xakrume shared a post, 2 years, 7 months ago
engineer

BASH Challenges in Customizing the Command Prompt in Linux and Their Solutions.

Transforming the Command Prompt: A Journey of Terminal Colors or How to Avoid Getting Trapped

misconfigured bash prompt