Davide BelloneforCode4ITcode4it.hashnode.net·Oct 14, 2022Code opinion: should we blindly trust Open Source after Log4J's issues?After the Log4J vulnerability, we should reflect on how open source impacts our projects, and what are the benefits and disadvantages of using such libraries. The following article is more of an opinion, just some random thoughts about what happened ...Paul Oloyede and 1 other are discussing this2 people are discussing thisDiscuss·12 likes·80 readsOpen Source
Consolation Obazeeforposterity.hashnode.net·Dec 2, 2022Why you should embrace Zero-Trust Security ModelColleague: Hi, can I use your computer for a minute? I'm having a downtime at the moment.Me: 🤒 (In my head, I'm such a nice person but the security professional in me is errrmmm, scratches my head.) What steps would you take if you were in my posit...Discuss·11 likes·34 readszerotrust
Ojo Itunu SamuelforMcsammymcsammy.hashnode.net·Feb 8, 2023Two Factor Authentication (2fa)Before considering the term “Two-factor Authentication” we should understand the importance of digital security in the present world. With our world evolving into a world of technology where almost all human activities are done online, some people li...Discuss·10 likesSecurity
Lloyd MckieforLloyd's Blogdeplloyd.hashnode.net·Apr 19, 2023Bob, AI Alice and MalloryLet's set the stage Bob is a Developer at a company. Bob has a new project on setting up IPv6 Networking which he's not familiar with. He wants to use the new Alice AI which he's heard so much about. However, he's not sure how much to share with Alic...Discuss·32 readsgenerative ai
yash negiforLinux | Cloud Computing | Open AIyash27.hashnode.net·Apr 14, 2023Microsoft Defender for Azure: Strengthening Your Cloud SecurityIn today's digital world, cloud computing has become an essential part of business operations. However, with the increased usage of cloud services, the risk of cyber threats has also escalated. To combat these threats, Microsoft has developed a compr...DiscussAzure
Balakrishnan Rajkumarforspikestory.hashnode.net·Apr 9, 2023Spoof Me If You CanIntroduction Email communication is an indispensable part of our life. All the organizations that we interact with, like Banks, E-Commerce sites, Government agencies etc use email as the preferred way of communication. Unfortunately, the popularity o...Discuss·45 readsemail security
Aditya Sharmaforadityash.hashnode.net·Apr 2, 2023Defying the Odds: Why Cloud Security Should be Top PriorityIntroduction In today's digital age, cloud computing has revolutionized the way businesses operate. However, with the increasing reliance on cloud technology, the risk of cyber-attacks and data breaches has also escalated. This blog discusses the imp...DiscussBlogsWithCC
Moses SamanthakurthiforDummies learnjadenmaxi.hashnode.net·Mar 27, 2023Protecting Your Online Privacy: A Guide to Installing Tails OSIn an age where data privacy and security are of utmost importance, Tails OS (The Amnesic Incognito Live System) provides a solution for those who want to protect their online activity. Tails is a privacy-focused operating system that is designed to ...Discusstails
ibukun soremekunforIbukun Soremekunibukunsoremekun.hashnode.net·Mar 23, 2023Authentication: Token Based Auth vs. Session Based AuthAuthentication is a crucial aspect of web application security that ensures the privacy and security of sensitive information. It is a process of verifying the identity of individuals, entities, or websites trying to access private information. Gener...Discussauthentication
Duke Andersonforduke014.hashnode.net·Mar 15, 2023How SSL Certificates work?Introduction When you visit a website, the first thing that happens is that the server sends you its public key and digital certificate. You use this information to check whether you trust the certificate, which helps establish secure communication b...DiscussSSL
Bilel BougarneforZer0daybilelbougarne.hashnode.net·Mar 7, 2023How to Start in Cybersecurity ?Why cybersecurity? Cybersecurity is one of the most trending fields in IT because, As technology grows risks will grow in parallel, and to prevent those risks we have to learn whats called 'Cybersecurity', but the question is how?. Where to start? St...Discuss#cybersecurity
Miguel AcevedoforMiguel Acevedo's blogmimixtech.hashnode.net·Feb 21, 2023AWS Announced Improved Security for S3 Buckets with New Default SettingsIntroduction AWS recently announced that starting in April 2023, new Amazon S3 buckets will have two new default security settings enabled automatically. This change is being made to help ensure that S3 buckets are set up securely and follow recommen...Discuss·54 readsAmazon S3
Kerwinfortriminator.hashnode.net·Feb 20, 2023WCB #8- Screenshot-based malware targets high value organizations in the U.S and Germany.Weekly Recap From meddling in elections to dangerous "disguised" Google ads, this week in Cyber had an array of engaging stories. Some of these stories include: Elections around the world manipulated by hackers - It has been reported that a unit of ...DiscussWeekly Cyber Briefphishing