Join us

heart Posts from the community tagged with Security...
Sponsored Link FAUN Team

#DevOps   #CloudCo...   #SRE  

@faun shared a link, 1 week, 2 days ago

Read CloudNative Weekly Newsletter

CloudNative Weekly Newsletter, The Chief I/O. Curated CloudNative news, tutorials, tools and more!

Join thousands of other readers, 100% free, unsubscribe anytime.

Story FAUN Team

#kuberne...   #Securit...   #contain...   #contain...   #contain...  

@eon01 shared a post, 1 month, 3 weeks ago
Founder, FAUN

New Partnership Announcement: FAUN and ContainerDay Security 2023

FAUN is glad to announce a partnership with ContainerDay Security.

Container Day Security
Story

#informa...   #Infosec   #cyberse...   #Securit...   #DevSecO...  

@tutorialboy24 shared a post, 5 months, 1 week ago
tut

Turning cookie based XSS into account takeover

EpilogueI reported the exploitation scenario and was rewarded €500, as the impact was high. Be patient, don’t give up, and think out of the box. In this case, I used the company’s service to exploit the bug.Source :- https://tutorialboy24.blogspot.com/2022/09/turning-cookie-based-xss-into-account.ht..

xss.png
Story

#Infosec   #cyberse...   #Securit...   #Securit...  

@tutorialboy24 shared a post, 6 months, 2 weeks ago
tut

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

IntroductionAs a representative of cloud-native management and orchestration systems, Kubernetes (K8S for short) is receiving more and more attention. A report [1] shows that 96% of organizations are using or evaluating K8S, and its market share in production environments is Visible.The functions of..

k8s
Story

#aws   #cost   #reliabi...   #Securit...   #Perform...  

@boldlink shared a post, 8 months ago
AWS DevOps Consultancy, Boldlink

An Overview of AWS Well-Architected Framework

Thinking of getting started with AWS cloud computing or migrating your existing workloads to AWS? Here is a quick guide on how the 5 pillars of AWS’s well-architected framework will help you build a secure, high-performing, resilient and efficient cloud infrastructure for your workloads.So basically..

AWS Image.png
Story

#aws   #cloud   #Securit...   #Serverl...   #CloudCo...  

@boldlink shared a post, 9 months, 3 weeks ago
AWS DevOps Consultancy, Boldlink

AWS Security Intro – 3. Network

Our teams at Boldlink have Architected and Engineered many different network configurations delivering security, high availability, connectivity, and scalability. Let us break down the most common setups for a cloud-native platform.AWS Shared Responsibility ModelConsider all traffic reaching your Pl..

Story

#cloud   #Securit...   #CloudCo...   #aws  

@boldlink shared a post, 10 months, 2 weeks ago
AWS DevOps Consultancy, Boldlink

AWS Security Intro – 1. Access

Getting security wrong on your AWS Organisations and Accounts is one of the biggest mistakes organisations regret, it cut Revenue; Reputation or kills the Business or the Business Unit. Everyone is online 24 hours and your AWS accounts and platforms are accessible 24 hours to be probed and tested fo..

Story

#Securit...  

@mdave shared a post, 1 year, 2 months ago
Security Consultant

OpenID Connect Concepts, Flows

This article covers the core concepts of OIDC. You dont need to know what these technologies are to understand this article.

Story

#Securit...   #DevSecO...   #DevOps  

@magalix shared a post, 1 year, 3 months ago
Magalix

Mitigating Apache Log4j Vulnerability with Policy-as-Code

What is  Apache log4j vulnerability (Log4Shell)? Mitigate the risks with policy-as-code. Learn how.

log4j Vulnerability
Story

#cloud   #Securit...   #Applica...   #Perform...   #CloudCo...  

@boriszn shared a post, 1 year, 3 months ago
Senior Software and Cloud Architect, IBM, Nordcloud

Common Performance Management Mistakes

In the figure above, you can see that the AKS cluster contains nodes that are represented as virtual machines under the hood. The Autoscaler is the main component here. It scales up the node count when the cluster is under high load. It also scales the node down to a standard size when the cluster i..

3.2.jpeg
Story

#DevSecO...   #Securit...   #DevOps  

@magalix shared a post, 1 year, 3 months ago
Magalix

Identify IaC Violations and Revert Misconfigured Resources Using GitHub

Identifying violations in your infrastructure as code (and applications) by creating policy-as-code standards is a pathway to shifting your security left.

Identify IaC Violations and Revert Misconfigured Resources Using GitHub