Abhiramcloudbuddy.hashnode.dev·15 hours agoThe Future of Vulnerability ManagementThe cybersecurity landscape is constantly evolving, with new threats emerging daily. Traditional vulnerability management practices, while essential, are often struggling to keep pace with the rapid changes in technology and the sophistication of cyb...DiscussVulnerability management
Arish Ahmadblog.arishahmad.in·Jul 25, 2024What is Cloud Computing? An Introductory GuideCloud Computing is the on-demand delivery of computing power, databases, storage, applications, and other IT resources through a cloud services platform over the Internet, using a pay-as-you-go pricing model. Cloud computing is an alternative to on-p...DiscussAWS Training Chronicles: From Novice to ExpertCloud
Lalita KashyapforLalita Kashyap's aws bloglalitakashyap-1719995781518.hashnode.dev·Jul 23, 2024Step-by-Step Guide to Configuring a Web Application Firewall in AWSFrom the AWS Management Console, click on "Services" and then select "WAF" under the Compute section or search for "waf" and click on "Create web ACL". Give name of waf Click on "Add AWS resources" Attach load balancer and click "Next" Cl...DiscussAWS
Rosecurifylog.rosecurify.com·Jul 20, 2024Seclog - #83📚 SecMisc Unsaflok - Unsaflok is a series of serious security vulnerabilities in the Saflok brand of hotel locks. Read More Index of /ubuntu/ubuntu/ubuntu/ubuntu/.. - Directory listing of Ubuntu archives. Read More 📰 SecLinks Global Microsoft ...Discuss·4 likesseclogSecurity
Abhiramcloudbuddy.hashnode.dev·Jul 19, 2024Generative AI and Cloud Security Orchestration: Conducting the Security SymphonyThe cloud has revolutionized how businesses operate, offering unparalleled scalability, agility, and cost-effectiveness. However, this digital haven comes with a significant responsibility: security. Securing cloud environments is a complex task, req...Discusscloud security
Harsh Ranjanharsh666.hashnode.dev·Jul 15, 2024The Role of DevOps in Managing Enterprise-Wide Cloud SecurityMoving to the cloud, enterprises face numerous security-related threats to the organization, including protection against data breaches, misconfigurations, compliance issues, and unauthorized access. Moreover, resources in the cloud are dynamically p...DiscussCloud
Rosecurifylog.rosecurify.com·Jul 13, 2024Seclog - #82📚 SecMisc beaconDB - An advanced database for security researchers and analysts. Read More BLAST RADIUS - A platform focused on visualizing and understanding the impact of security breaches. Read More Deep-ML - A cutting-edge tool leveraging deep...Discuss·1 likeseclogSecurity
Abhiramcloudbuddy.hashnode.dev·Jul 12, 2024From Chaos to Cosmos: How Generative AI Can Automate Threat Detection in the CloudThe cloud has become the lifeblood of modern businesses. From housing mission-critical applications to storing sensitive data, organizations are increasingly reliant on cloud infrastructure. But with this convenience comes a growing challenge: securi...DiscussThreatDetection
Sprasad Pujarisprasad.hashnode.dev·Jul 11, 2024"🔒 Securing Kubernetes Deployments: A Hands-On Guide to ConfigMaps, Secrets, and RBAC 🛡️"As a DevOps engineer, managing application configurations securely is crucial. Let's explore how Kubernetes helps us achieve this with ConfigMaps and Secrets. 📘 ConfigMaps: Your Configuration Companion What are ConfigMaps? Kubernetes objects for s...DiscussK8sSecrets
Umesh Panditumeshpandit.hashnode.dev·Jul 9, 2024How to Create a VPN Gateway in Microsoft Azure: A Step-by-Step GuideAre you curious about secure connections in today's digital world? A VPN (Virtual Private Network) is essential for secure communication, especially in cloud computing. In this article, I will guide you through the process of creating a VPN Gateway i...Discussazure vpn gateway