Found 77 bookmarks
Newest
Hack The Box: The #1 Cybersecurity Performance Center
Hack The Box: The #1 Cybersecurity Performance Center
HTB is the leading Cybersecurity Performance Center for advanced frontline teams to aspiring security professionals & students. Start driving peak cyber performance.
·hackthebox.com·
Hack The Box: The #1 Cybersecurity Performance Center
CyberDefenders - Blue Team Training Platform
CyberDefenders - Blue Team Training Platform
Blue team training platform for SOC analysts, threat hunters, DFIR, and security blue teams to advance CyberDefense skills.
·cyberdefenders.org·
CyberDefenders - Blue Team Training Platform
API Security: Key Protocols - APIDNA
API Security: Key Protocols - APIDNA
Here we go through some of the essential protocols required for robust API security.
·apidna.ai·
API Security: Key Protocols - APIDNA
Intro to AI Security Part 1: AI Security 101
Intro to AI Security Part 1: AI Security 101
For at least two years now I have been complaining about the lack of Artificial Intelligence (AI) Security resources. I complain about many…
·medium.com·
Intro to AI Security Part 1: AI Security 101
How to Fortify Your Docker Containers: A Guide to Advanced Security Practices
How to Fortify Your Docker Containers: A Guide to Advanced Security Practices
Introduction DevOps has been rapidly evolving in the software development landscape, and from the cornerstone Docker has emerged. Its ability to package applications into portable, scalable containers has taken deployment strategies to the next level. However, with this power, comes the responsibility of securing the containers. In this blog, we dive deep into advanced techniques and best practices for securing Docker containers, ensuring your deployments are not just efficient but also fortified against a variety of cyber threats.
·blog.coderco.io·
How to Fortify Your Docker Containers: A Guide to Advanced Security Practices
Rego 101: Introduction to Rego | Snyk
Rego 101: Introduction to Rego | Snyk
Learn how to write your first policy as code rules in Rego. This Rego tutorial for beginners covers the basics of Rego syntax and using OPA.
·snyk.io·
Rego 101: Introduction to Rego | Snyk
State of Cloud Security | Datadog
State of Cloud Security | Datadog
We analyzed data from thousands of organizations to understand the latest trends in cloud security posture.
·datadoghq.com·
State of Cloud Security | Datadog
Securing HTML fragments returned by API endpoints
Securing HTML fragments returned by API endpoints
A web application frontend often performs requests to a backend API. Even though this API is only supposed to be used by the frontend, it is usually also accessible with a browser. An attacker can use this to exploit vulnerabilities.
·sjoerdlangkemper.nl·
Securing HTML fragments returned by API endpoints
Cryptography Guidelines
Cryptography Guidelines
Guidance on implementing cryptography as a developer.
·samuellucas.com·
Cryptography Guidelines