Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General
    • Welcome New Members !
    • General Discussion
    • Ask a Question
    • Site News
  • DevOps & SRE
    • DevOps & SRE
    • Databases
    • Development
    • CI/CD
    • Docker, Containers & Serverless
    • Infrastructure-as-Code
    • Kubernetes
    • Linux
    • Logging, Monitoring & Observability
    • Security
  • Cloud Providers
    • AWS
    • Azure
    • GCP
    • OpenShift

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


LinkedIn Profile URL


About Me


Development Experience


Cloud Experience


Current Role


Skills


Certifications


Favourite Tools


Interests

  1. At HashiDays in June, we announced the public beta for a new offering on the HashiCorp Cloud Platform: HCP Vault Secrets is a powerful new tool designed to identify, control, and remediate secrets sprawl and centralize secrets management by synchronizing secrets across platforms. Secrets are unlike traditional credentials because they are leveraged by developers, applications, services, infrastructure, and platforms to establish trusted identities. As organizations distribute their workloads across more platforms they lose centralized control over identity security and become more exposed to secrets sprawl. This post reviews the secrets sync beta feature released as part of Vault Enterprise 1.15 and discusses how it will help organizations corral secrets sprawl and regain centralized control and visibility of their secrets... View the full article
  2. ForAllSecure provided early access to dynamic SBOM generation and SCA validation capabilities within its Mayhem Security automated code and API testing tool. View the full article
  3. Don MacVittie explains that today's security approaches just aren't cut out for the threats organizations face. View the full article
  4. Microsoft’s primary method for managing identities by workload has been Pod identity. However, the company’s Pod identity technology and workflows are being deprecated and will not be supported after December 2023. Microsoft will continue to support identity workflows with its Workload Identity Federation (WIF) product, which was released as part of Vault 1.15 to deepen Vault’s integration with MS Azure. In this post, we’ll take a deeper look at the advantages and caveats of WIF... View the full article
  5. In this post, we’ll explore how to publish and consume services running on Amazon Elastic Container Service (Amazon ECS) and AWS Lambda, as Amazon VPC Lattice services. For an introduction to Amazon VPC Lattice, please read the documentation here. One main reason customer experience a lower velocity of innovation, is the complexity they deal with while trying to ensure that their applications can communicate in a simple and secure way. Amazon VPC Lattice is a powerful application networking service that removes this complexity, and gives developers a simpler user experience to share their application and connect with dependencies without having to setup any of the underlying network connectivity across Amazon Virtual Private Clouds (Amazon VPCs), AWS accounts, and even overlapping IP addressing. It handles both application layer load balancing and network connectivity, so that developers can focus on their applications, instead of infrastructure... View the full article
  6. AWS WAF now supports JA3 match, enabling customers to inspect incoming requests’ JA3 fingerprints. Customers can use the JA3 match to implement custom logic to block malicious clients or allow requests from expected clients only. View the full article
  7. Checkmarx reported that malicious actors have been able to compromise GitHub's Dependabot, the free automated dependency management tool for software projects. View the full article
  8. Securing the SDLC is a never-ending battle against hidden risks and formidable adversaries and requires security champions to share their wisdom. View the full article
  9. Palo Alto Networks' Daniel Krivelevich shares a general three-step framework organizations can use to secure the CI/CD pipeline and surrounding areas. View the full article
  10. Infrastructure as Code (IaC) has revolutionized the way organizations provision and manage their infrastructure. By defining infrastructure through code, IaC offers automation, scalability, and consistency benefits. However, this newfound agility also brings security challenges. IaC security scanning is a critical practice that helps organizations identify and mitigate potential vulnerabilities in their infrastructure code. In this guide, we'll explore the importance of IaC security scanning, its benefits, best practices, and available tools. Click Here To Read More
  11. Amazon Connect now supports AWS CloudFormation for security profiles. You can now use AWS CloudFormation templates to deploy Amazon Connect security profiles —along with the rest of your AWS infrastructure— in a secure, efficient, and repeatable way, allowing you to apply consistent security policies across instances. CloudFormation allows you to track changes over time, apply updates in a controlled and automated manner, and includes version controls so you can easy roll back changes if needed. For more information, see Amazon Connect Resource Type Reference in the AWS CloudFormation User Guide. View the full article
  12. Many organizations continue to use antiquated methods to manage and track certificates. Common methods include tracking certificates in spreadsheets, text documents, and ticketing solutions. These methods are not only time consuming, taking hours or days to provision or renew certificates, they can also lead to security and compliance issues. The lack of an alerting mechanism or management interface can lead to systems outages that are otherwise easily avoidable... View the full article
  13. We’re excited to announce that GitHub Advanced Security for Azure DevOps is now generally available and is ready for you to use in your own Azure DevOps repos! You can now enable code, secret, and dependency scanning within Azure Repos and take advantage of the new product updates. Learn how to enable Advanced Security in your Azure Repos > Thanks to your great feedback, we were able to identify issues and deliver updates that address key improvements since our public preview. You wanted: Faster onboarding after registering for Advanced Security The ability to enable multiple repos simultaneously More upfront clarity in billing Better visibility into all enabled repo alerts through a single pane of glass View the full article
  14. The post 16 Apache Web Server Security and Hardening Tips first appeared on Tecmint: Linux Howtos, Tutorials & Guides .Apache web server is one of the most popular and widely used web servers for hosting files and websites. It’s easy to install and configure The post 16 Apache Web Server Security and Hardening Tips first appeared on Tecmint: Linux Howtos, Tutorials & Guides.View the full article
  15. The OpenSSF hosted a Secure Open Source Software (SOSS) Summit 2023 event during which it made available a Secure Open Source Software Vision Brief 2023. View the full article
  16. OpenTDF lets you integrate encryption and data policy controls into your new and existing apps to safeguard your data. View the full article
  17. In today’s digital landscape, web application security is paramount. As businesses increasingly migrate their operations to the cloud, the importance of safeguarding web applications hosted on platforms like Microsoft Azure cannot be overstated. This article will delve deep into the top 10 web application security risks specific to the Microsoft Azure cloud environment. For each […] The article Top 10 Web Application Security Risks in Microsoft Azure and Ways to Mitigate Them appeared first on Build5Nines. View the full article
  18. DevOps teams must maximize development speed without compromising security. Here are three ways to do that. View the full article
  19. Shift left involves providing developers with the context they need to prioritize and remediate threats appropriately. View the full article
  20. HashiCorp this week acquired BluBracket to add a set of static secrets discovery tools to its portfolio.View the full article
  21. When it comes to Kubernetes security, the devil is in the details. Its system, aimed at simplifying infrastructure management, is so complex and intricate that you can’t secure Kubernetes with basic security checks. Kubernetes security needs a deeper understanding of the ecosystem and strategies to secure it at different levels, like nodes, pods, and data. Additionally, you need purpose-built tools that can adapt to the complexity of Kubernetes and secure the system end-to-end. Red Hat reports that 94% of DevOps engineers faced at least one Kubernetes security issue in 2022. Further, security concerns have delayed application deployment in over 67% of the cases. Another significant consequence of weak security is loss of revenue and customers as they lose trust in the organizations to provide a secure experience. With Kubernetes clusters attracting significant interest from hostile actors in addition to its security loopholes, any development team must be increasingly cautious. For that, we first need to understand what Kubernetes security is... View the full article
  22. In March, we introduced the beta version of the HashicCorp Vault Secrets Operator for Kubernetes. Today, the Operator has reached general availability. We received a great deal of feedback from our user community that helped us identify and prioritize features for the Vault Secrets Operator GA. This post covers the functionality of the Vault Operator and reviews the new features released along with GA... View the full article
  23. We’ve all seen the data from the latest Verizon Data Breach Incident Report that shows half of security breaches stem from credential abuse. It’s clear that credential compromise is an epidemic in cybersecurity and can be largely avoided with multifactor authentication and least-privilege policies. Misused credentials have shot up by almost 30% over the last […] The post The Missing Link in DevOps Cloud Security appeared first on DevOps.com. View the full article
  24. In the episode of View with Vizard, Mike Vizard sits down with Om Vyas, chief product officer for oak9, as he explains why security engineers need to become part of every DevOps team. The video is below followed by a transcript of the conversation. Vizard: Hey, guys. Thanks for the throw. We’re here with Om […] View the full article
  25. Contrast Security has fully extended its vulnerability scanning and runtime application self-protection (RASP) platform to now include application programming interfaces (APIs). Company CTO Jeff Williams said the Contrast Secure Code Platform embeds agents directly into code to detect vulnerabilities using a combination of integrated static and dynamic application security testing tools. That approach makes it […] View the full article
  • Member Statistics

    277
    Total Members
    99
    Most Online
    siyona
    Newest Member
    siyona
    Joined
×
×
  • Create New...