Foluso Ogunsakinnotonprem.hashnode.dev·May 14, 2024FeaturedSecuring Your AWS VPC with an Automated Quarantine SolutionIn the age of the Cloud, setting up computing infrastructure has become relatively easy. This can also mean the data and resources in the cloud are not properly protected from malicious actors and activities if the right controls, monitoring and conf...Discuss·62 likes·118 readsAWS
Srimathi Sinfraworld.hashnode.dev·2 hours agoEnhancing GCP Security and Flexibility with Impersonation Service Accounts and Signed URLsImpersonation Service Accounts Maintaining robust security while ensuring seamless access to systems and data is crucial. Impersonation service accounts in Google Cloud Platform (GCP) help achieve this balance by allowing applications or services to ...DiscussImpersonate Service Account
Raja Kalyanapucloudadventurer.hashnode.dev·6 hours agoSimplifying AWS Security: IAM, Groups, Roles, and Policies ExplainedIAM, Groups ,Roles and Policies are essential concepts in AWS (Amazon Web Services) for securely managing access to AWS resources. Let's take a closer look at each of these concepts. What is IAM? IAM (Identity and Access Management) in AWS is a servi...DiscussAWS
Q8 { Empowering ChangeProq08.org·9 hours agoRedefining the Relationship Between Privacy, Security, and Personal Autonomy1. Introduction In an increasingly digital world, the concepts of privacy, security, and personal autonomy have become central to discussions about individual rights and societal norms. These three pillars, while distinct, are deeply interconnected. ...Discussprivacy
Rosecurifylog.rosecurify.com·13 hours agoSeclog - #74From wonder into wonder existence opens. — Laozi 📚 SecMisc Prompt Firewall - AI/ML Security & Privacy - Explore the platform dedicated to AI/ML security and privacy. Read More Remote Code Execution by Server-Side Template Injection in Model Metad...Discussseclogseclog
Cloud Tunedcloudtuned.hashnode.dev·21 hours agoExploring OWASP ZAP: Your Ultimate Web Application Security CompanionExploring OWASP ZAP: Your Ultimate Web Application Security Companion OWASP ZAP (Zed Attack Proxy) is a powerful open-source security testing tool designed to help developers and security professionals identify and mitigate security vulnerabilities i...DiscussOWASP ZAP
Sri Durgesh Vsridurgeshv.hashnode.dev·May 17, 2024Enhancing Security in Your E-Commerce Platform: Integrating AWS Cognito with Your React Application [Part - 1]Introduction: Welcome back to my journey of architecting the future of e-commerce In this installment, I delve into the cornerstone of user trust and security: authentication. Join me as I explore the intricacies of implementing user authentication u...Discuss·10 likesAWS
Cloud Tunedcloudtuned.hashnode.dev·May 17, 2024Understanding Insecure Direct Object References (IDOR)Understanding Insecure Direct Object References (IDOR) Insecure Direct Object References (IDOR) is a common security vulnerability that occurs when an application exposes sensitive data or functionality by directly referencing internal objects or res...DiscussIDOR
Sophia Iroegbusophyia.me·May 17, 2024Secure Your Django App with Parameterized QueriesBuilding software goes beyond creating a functional application or solution. You also need to protect user data and privacy, which shows you care not only for the problem your application solves but also for your users. In this short guide, we will d...DiscussDjango
Chinmay Pandyachinmaypandya.hashnode.dev·May 16, 2024Secure Your APIs (Part 1) : Leakage and ProxyingAPI Leakage Everybody uses APIs in their applications but did you know that your API request might contain sensitive information which you might not wanna share with others, such as API keys/tokens. API keys/tokens are a way in which you can authoriz...Discuss·27 readsAPIs
Cloud Tunedcloudtuned.hashnode.dev·May 16, 2024Understanding Server-Side Request Forgery (SSRF)Understanding Server-Side Request Forgery (SSRF) Server-Side Request Forgery (SSRF) is a security vulnerability that occurs when an attacker is able to send unauthorized requests from a vulnerable server. This type of attack can lead to data leaks, s...Discussssrf