Ikoh Sylvaikohsylva.hashnode.dev·Nov 20, 2024Encryption and Key Management Strategies for Financial WorkloadsIn an era where data breaches are increasingly common, the financial services industry faces heightened scrutiny regarding the protection of sensitive customer information. With strict regulatory requirements, financial institutions must implement ro...Discuss·6 likesAWS
Ikoh Sylvaikohsylva.hashnode.dev·Nov 16, 2024AWS Security Blogs and Whitepapers, Your Guide to Cloud Security KnowledgeAs organizations increasingly adopt cloud technologies, understanding and implementing robust security practices is paramount. Amazon Web Services (AWS), a leader in cloud computing, provides a wealth of resources, including blogs and whitepapers, to...Discuss·15 likesCloud
Rosecurifylog.rosecurify.com·Nov 17, 2024Seclog - #100"The enemy does not check your risk register prior to attacking." - Sun Tzu, The Art of Cyber War 📚 SecMisc PoisonTap - Exploiting locked computers through USB peripherals, demonstrating techniques to bypass security measures on locked machines. Re...DiscussseclogBlueHat2024
Ikoh Sylvaikohsylva.hashnode.dev·Nov 13, 2024AWS Security Benchmarking, Ensuring Robust Cloud SecurityAs organizations migrate to the cloud, ensuring the security of their data and applications becomes paramount. AWS (Amazon Web Services) provides a vast array of services and tools designed to enhance security, but with these capabilities comes the c...Discuss·11 likesAWS
Lars KampforFix Security Blogfix.security·Nov 13, 2024The shared responsibility model for cloud securityAs a cloud user, your responsibilities to secure your infrastructure vary depending on your cloud service provider (CSP), the services you use, your industry and the country you're based in. The matrix can become complex, with responsibilities often ...Discuss·30 readsCloud securityshared responsibility model
Merbin Russelblog.merb.in·Nov 13, 2024Distroless: Balancing Security with PracticalityDistroless images are a type of Docker image designed to be as minimal as possible, containing only the essential components required to run a specific application. Advocates of Distroless claim that this minimalism enhances security by reducing the ...Discuss·86 readsdistroless
Ikoh Sylvaikohsylva.hashnode.dev·Nov 11, 2024AWS Control Tower for Multi-Account SecurityAs organizations increasingly adopt cloud technologies, the complexity of managing multiple accounts becomes a significant challenge. AWS Control Tower emerges as a comprehensive solution that simplifies governance and enhances security across multip...Discuss·12 likesCloud
Lars KampforFix Security Blogfix.security·Nov 11, 2024What is a cloud asset inventory?Cloud-native infrastructure has brought a proliferation of cloud services—and cloud providers are adding more on an ongoing basis. Developers may have the permissions to start testing these new services without the knowledge of DevOps and security te...Discuss·64 readsCloud securitycloud security
Freeman Madudilifreemancodz.hashnode.dev·Nov 11, 2024Storing Secrets in Azure Key Vault and Accessing with Managed IdentityIn this guide, I’ll walk you through securing sensitive information, like database connection strings, using Azure Key Vault and accessing it from your Function App or App Service with a managed identity. This way, you avoid hardcoding secrets in you...DiscussAzure Key Vault
Rosecurifylog.rosecurify.com·Nov 9, 2024Seclog - #99"To deceive your enemy, make your vulnerabilities appear as your strengths." - The Art of Cyber War 📚 SecMisc Movies for Hackers - A curated list of movies that hackers would enjoy - Read More 📰 SecLinks Hacking 700 Million Electronic Arts Acco...Discussseclogbrowser hacking