Andrew Brownandrewbrown.hashnode.netΒ·Jul 28, 202116 years experience and I want to start with cloud securityHello Andrew I have total 16 years of experience which includes both application development and application security I want to start with cloud security, However, my current organization is not working with cloud in any way and doesn't look like it ...229 likesΒ·674 readsAsk Andrew Cloud AdviceCloud
Andrew Brownandrewbrown.hashnode.netΒ·Aug 3, 2021My dream one day is to work for a larger company as a Cloud Engineer and eventually specialize in AWS security. What is a realistic path?Hello Andrew, I just wanted to start by thanking you for all you are doing for the devops community. A little background I have a bachelors in IT and I currently work in a IT Support/Junior System admin role. This is my first full time IT job and I h...193 likesΒ·695 readsAsk Andrew Cloud AdviceCloud
Tapas Adhikaryatapas.hashnode.netΒ·Jun 22, 2021Web security attacks you must know - Part 1Originally Published on Bugfender As developers, we know the pitfalls of the internet - the gateways that malicious actors can exploit to steal private data, siphon money, and generally wreak havoc. But if we're going to build watertight application...134 likesΒ·2.2K readsWeb SecurityWeb Development
Abhay Singhabhaysingh.hashnode.netΒ·Mar 4, 2024How Generative AI is Revolutionizing DevSecOpsWhat is Generative AI? Generative AI refers to advanced machine learning models capable of creating new content, including text, code, images, and more. Popular examples include ChatGPT and other large language models (LLMs), along with image generat...blog
Arnab Chatterjeearnabchatterjee20k.hashnode.netΒ·Apr 25, 2023Server Session Based Authentication over JWT authentication?? π€π€Backend security is one of the crucial topics in backend development but most of us neglect it not because we want to but lack of resources. If we analyze the backend resources available to us the correct direction for a good backend is really very l...37 readsWeMakeDevs
Santoshdtssantoshdts.hashnode.netΒ·Apr 25, 2023Threat Modeling 101: A Beginner's Guide to Securing Your SoftwareIntro and Why is Threat Modeling Necessary? With the increasing use of technology in all aspects of our lives, the threat landscape has become more complex and challenging. Threat actors are becoming more sophisticated in their attack methods, and th...WeMakeDevs
Satish Sutarsatishsutar-cloud-and-devops.hashnode.netΒ·Apr 25, 2023AWS CloudTrailIntroduction AWS CloudTrail is a service that enables the monitoring and auditing of API activity within your AWS account. It captures all API calls and events made by and to your AWS account and makes it available as a log file. This log file can be...2 likesAWS Cloud SafariAWS
Cyvisorycyvisory.hashnode.netΒ·Apr 24, 2023How to secure Emails in 2023Every Day roughly 350 billion emails are send globally, which equals 44 emails per person on earth each day. Most people don't know that emails by default are sent unencrypted over the wire, leaving them vulnerable to interception as well as person ...cyber
Jordi Bassaganasprogramarivm.hashnode.netΒ·Jul 26, 2021How to Create a WebSocket Server With TLS/SSLBack in the 2000s, there was no such thing as a free SSL certificate issued instantly online by a trusted certificate authority (CA). If you wanted one you had to pay for it and some of them used to be more expensive than they are today. By then webs...Web Development
Tim Schindlertimschindler.hashnode.netΒ·Apr 24, 2023Effortlessly Setting Up A CyberArk PAM Self-Hosted Lab with AutomatedLabIf you want to learn CyberArk PAM self-hosted without risking your production environment or experiment with different configurations and test scenarios, setting up a personal lab environment is a great option. However, installing the Vault and its c...274 readscyberark
Fiko Borizqyfiko.hashnode.netΒ·Apr 24, 2023How to use GPG?How to create key? Simply we can run this: gpg --full-gen-key Then we will have some interactives. Key Type It's optional, but I oftenly use RSA and RSA (number 1) Keysize (Bits) It's more secure to have more bit or simply we can take the maximu...Linux
Ritesh Kokamriteshkokam.hashnode.netΒ·Apr 23, 2023Secure your Docker EnvironmentIntroduction Docker has revolutionized the way we develop, deploy and manage applications. It has become the go-to platform for containerization, allowing developers to easily create, deploy and run applications in a variety of environments. However,...Docker
Caio Ferreiracaiorcferreira.hashnode.netΒ·Apr 23, 2023Reflections about Supervised Learning on SecuritySupervised learning is a technique that aims to learn a hypothesis function h that fits a behavior observed in the real-world, which is governed by an unknown function \(f\). To learn this function, we use a set of example data points composed of inp...45 readsai