Security

Security

77 bookmarks
Custom sorting
Cryptography Guidelines
Cryptography Guidelines
Guidance on implementing cryptography as a developer.
·samuellucas.com·
Cryptography Guidelines
A deep dive into Deno and its comparison with Node.js
A deep dive into Deno and its comparison with Node.js
Explore Deno and Node.js differences. Learn about Deno's enhanced module system, stable APIs, and security. Discover its use cases and drawbacks in the tech world.
·bejamas.io·
A deep dive into Deno and its comparison with Node.js
Cyberattacks Are Inevitable. Is Your Company Prepared?
Cyberattacks Are Inevitable. Is Your Company Prepared?
Preparing for the unexpected is much easier said than done. In the case of cyberattacks, many companies have vulnerabilities in their defenses and reactions they haven’t prepared for that hackers will test. Many organizations can benefit from instituting fire drills and tabletop exercises, which test a company’s response plan at every level. These exercises will almost certainly reveal gaps in security, response plans, and employees’ familiarity with their own roles. While investing in external facilitators for these exercises will often allow for a more rigorous test separate from internal dynamics, there is guidance for organizations who wish to execute internal exercises to better prepare for a cyberattack.
·hbr.org·
Cyberattacks Are Inevitable. Is Your Company Prepared?
From Akamai to F5 to NTLM... with love.
From Akamai to F5 to NTLM... with love.
In this post, I am going to show the readers how I was able to abuse Akamai so I could abuse F5 to steal internal data including authorization and session tokens from their customers.
·blog.malicious.group·
From Akamai to F5 to NTLM... with love.
State of Cloud Security | Datadog
State of Cloud Security | Datadog
We analyzed data from thousands of organizations to understand the latest trends in cloud security posture.
·datadoghq.com·
State of Cloud Security | Datadog
Rego 101: Introduction to Rego | Snyk
Rego 101: Introduction to Rego | Snyk
Learn how to write your first policy as code rules in Rego. This Rego tutorial for beginners covers the basics of Rego syntax and using OPA.
·snyk.io·
Rego 101: Introduction to Rego | Snyk
How to Fortify Your Docker Containers: A Guide to Advanced Security Practices
How to Fortify Your Docker Containers: A Guide to Advanced Security Practices
Introduction DevOps has been rapidly evolving in the software development landscape, and from the cornerstone Docker has emerged. Its ability to package applications into portable, scalable containers has taken deployment strategies to the next level. However, with this power, comes the responsibility of securing the containers. In this blog, we dive deep into advanced techniques and best practices for securing Docker containers, ensuring your deployments are not just efficient but also fortified against a variety of cyber threats.
·blog.coderco.io·
How to Fortify Your Docker Containers: A Guide to Advanced Security Practices
Intro to AI Security Part 1: AI Security 101
Intro to AI Security Part 1: AI Security 101
For at least two years now I have been complaining about the lack of Artificial Intelligence (AI) Security resources. I complain about many…
·medium.com·
Intro to AI Security Part 1: AI Security 101
CSS Fingerprint
CSS Fingerprint
CSS fingerprinting, no JS required!
·csstracking.dev·
CSS Fingerprint