Umesh Panditumeshpandit.hashnode.dev·Feb 9, 2025Azure Private Link vs. Service Endpoints: Which One Should You Use?Choosing the right network connectivity option in Azure can be confusing. Two common choices are Azure Private Link and Service Endpoints. While both improve access to Azure services, they work differently and serve different needs. This guide will h...Azure
Ian Santillanievsantillan.hashnode.dev·Feb 4, 2025Insights from the Microsoft Security Engineering Partner Airlift 2025 in RedmondEarlier this month, I had the privilege of attending the Microsoft Security Engineering Partner Airlift 2025, held from January 21–23 at Microsoft’s headquarters in Redmond, WA. The event was packed with deep technical sessions, product roadmap insig...Microsoft
Jayakumar Sakthivelcloudwithjk.hashnode.dev·Feb 4, 2025Open Source CWPP Solutions: An introduction to Falco, Tracee, and TetragonIntroduction In today's cloud-native landscape, securing workloads has become more critical than ever. While commercial Cloud Workload Protection Platform (CWPP) solutions dominate the market, the open-source community offers robust alternatives that...30 readscwpp
Subhanshu Mohan Guptablogs.subhanshumg.com·Jan 20, 2025The Power of Rootless Docker ContainersIn the rapidly evolving world of DevSecOps, ensuring secure deployments is more critical than ever. Enter Docker rootless containers, a groundbreaking solution designed to enhance container security by eliminating the need for root privileges. This a...10 likesAdvanced DockerRootlessDocker
Minh Thông Lêcloudsec1030.hashnode.dev·Jan 17, 2025Introduction To My Cloud Security BlogWhen I moved abroad, one of my biggest priorities became finding my passion. The pursuit felt exhilarating and, at times, daunting. After so many self-study sessions, I’ve explored a multitude of fields: namely data science, quant finance, algorithmi...introduction
Sourav Chakrabortydevsecopssourav.hashnode.dev·Jan 5, 2025content-type validation during file uploads to an AWS S3 bucketUploading files to an AWS S3 bucket is a common requirement in modern applications, but it comes with a crucial responsibility—validating the content type of the uploaded files. Without proper validation, malicious or unwanted file types could slip t...27 readss3security
Celestina Odilitinatech.hashnode.dev·Dec 1, 2024Configure and Deploy Microsoft Sentinel as a Security Information and Event Management (SIEM) SolutionIntroduction In today’s digital landscape, protecting an organization’s IT infrastructure from evolving threats is more critical than ever. A robust Security Information and Event Management (SIEM) solution forms the backbone of modern cybersecurity ...1 like·29 readsMicrosoft Sentinel
Ryan Williamsora-wtf.com·Nov 30, 2024Enhance Oracle Cloud Security with Landing ZonesOracle Enterprise Landing Zones are frameworks within Oracle Cloud Infrastructure (OCI) designed to create secure and scalable cloud environments for enterprises. They include various versions such as OELZ v1, OELZ v1 Lite, OELZ v2, and CIS OCI Landi...oracle-cloud-security
Ray Makasiraymakasi.hashnode.dev·Nov 30, 2024Amazon GuardDuty use case for small BusinessesAmazon GuardDuty is a powerful threat detection service offered by AWS that provides continuous monitoring and protection for your AWS accounts, workloads, and data. For a small business company, GuardDuty offers an intelligent and cost-effective sol...aws-guarduty
Abhiramcloudbuddy.hashnode.dev·Nov 17, 2024Ensuring Compliance in a Shared Responsibility ModelIn today's cloud-first world, organizations are increasingly adopting cloud-based solutions to enhance their operations. However, this shift brings forth a unique challenge: shared responsibility for security. While cloud providers are responsible fo...cloud compliance