Join us

heart Posts from the community tagged with Security...
Sponsored Link FAUN Team
@faun shared a link, 1 year, 9 months ago

Read DevSecOps Weekly

DevSecOps Weekly Newsletter, Zeno. Curated DevSecOps news, tutorials, tools and more - Join thousands of other readers, 100% free, unsubscribe anytime. 

Story
@kimberly shared a post, 10 months ago

Top 5 Reasons Why PKI As A Service Is Essential for Encryption

Top 5 Reasons Why PKI As A Service Is Essential for Encryption Did you know public key infrastructure (PKI) as a service has become an indispensable component of a robust encryption strategy and security posture for modern organizations? Companies can implement and scale enterprise-grade encryption ..

Photo of a  monitor screen
Story Mia-Platform Team
@pmartinoli shared a post, 1 year, 6 months ago
Technical Writer, Mia-Platfom

Service Account 101: the Power of M2M with Security in Mind

Service Accounts are useful but, if not properly managed, they can pose security risks. Read the article to learn how to securely use a Service Account!

BlogPost_Yellow05.jpg
Story FAUN Team
@eon01 shared a post, 1 year, 10 months ago
Founder, FAUN

New Partnership Announcement: FAUN and ContainerDay Security 2023

FAUN is glad to announce a partnership with ContainerDay Security.

Container Day Security
Story Trending
@tutorialboy24 shared a post, 2 years, 2 months ago
tut

Turning cookie based XSS into account takeover

EpilogueI reported the exploitation scenario and was rewarded €500, as the impact was high. Be patient, don’t give up, and think out of the box. In this case, I used the company’s service to exploit the bug.Source :- https://tutorialboy24.blogspot.com/2022/09/turning-cookie-based-xss-into-account.ht..

xss.png
Story
@tutorialboy24 shared a post, 2 years, 3 months ago
tut

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

IntroductionAs a representative of cloud-native management and orchestration systems, Kubernetes (K8S for short) is receiving more and more attention. A report [1] shows that 96% of organizations are using or evaluating K8S, and its market share in production environments is Visible.The functions of..

k8s
Story
@boldlink shared a post, 2 years, 4 months ago
AWS DevOps Consultancy, Boldlink

An Overview of AWS Well-Architected Framework

Thinking of getting started with AWS cloud computing or migrating your existing workloads to AWS? Here is a quick guide on how the 5 pillars of AWS’s well-architected framework will help you build a secure, high-performing, resilient and efficient cloud infrastructure for your workloads.So basically..

AWS Image.png
Story
@boldlink shared a post, 2 years, 6 months ago
AWS DevOps Consultancy, Boldlink

AWS Security Intro – 3. Network

Our teams at Boldlink have Architected and Engineered many different network configurations delivering security, high availability, connectivity, and scalability. Let us break down the most common setups for a cloud-native platform.AWS Shared Responsibility ModelConsider all traffic reaching your Pl..

Story
@boldlink shared a post, 2 years, 7 months ago
AWS DevOps Consultancy, Boldlink

AWS Security Intro – 1. Access

Getting security wrong on your AWS Organisations and Accounts is one of the biggest mistakes organisations regret, it cut Revenue; Reputation or kills the Business or the Business Unit. Everyone is online 24 hours and your AWS accounts and platforms are accessible 24 hours to be probed and tested fo..

Story
@mdave shared a post, 2 years, 11 months ago
Security Consultant

OpenID Connect Concepts, Flows

This article covers the core concepts of OIDC. You dont need to know what these technologies are to understand this article.

Story
@magalix shared a post, 2 years, 11 months ago
Magalix

Mitigating Apache Log4j Vulnerability with Policy-as-Code

What is  Apache log4j vulnerability (Log4Shell)? Mitigate the risks with policy-as-code. Learn how.

log4j Vulnerability
loading...