Balajibalajidevops.hashnode.dev·Mar 29, 2024Title: Exploring Prowler: A Comprehensive Guide to AWS Security and Compliance MonitoringIntroduction: In today's cloud-centric world, ensuring the security and compliance of AWS (Amazon Web Services) environments is paramount for organizations of all sizes. Prowler, an open-source security tool, has emerged as a powerful solution for au...Discuss·2 likes·59 readsAWS
Alice Githuialicegithui.hashnode.dev·Mar 12, 2024OWASP Top 10 2023The OWASP (Open Worldwide Application Security Project) Top 10 is a regularly released report that details the security risks for web application security, focusing on the top 10 security concerns. It aims to provide tools and resources to make web a...DiscussOWASP TOP 10
MeghOpsforMeghOpsblog.meghops.io·May 10, 2023How MeghOps Can Make SecOps Easy?MeghOps is a CSPM solution. CSPM stands for Cloud Security Posture Management. It refers to the process of monitoring and managing the security posture of cloud environments to ensure that they comply with security policies and regulations. CSPM solu...Discuss·40 readsSecurity
Rahul Khinchirahulk7.hashnode.dev·Apr 3, 2023Tunnels: Connect your localhost with the rest of your teammates and the worldIntroduction In the world of software development, it is not uncommon to need to share our applications running locally with our team members or with clients. The process of sharing a locally running application with the rest of the world can be a ch...Discuss·9 likes·81 readspasswords
Rahul Khinchirahulk7.hashnode.dev·Mar 22, 2023Integrating Onboardbase: The All-in-One SecretOps InfrastructureAs a developer, managing environment variables and secret credentials can be a daunting task. Hardcoded secrets, env files, and copy-pasted credentials can easily become a security nightmare. That's where Onboardbase comes in. Onboardbase is an all-i...Discuss·1 like·76 reads#cybersecurity
Ferenc SzalaiforPionlabpionlab.hashnode.dev·Feb 5, 2023How to use Kubernetes External Secrets Operator with Private Container RegistryWe show how to streamline the management of pull secrets of private repositories such as GitLab with a combination of External Secrets Operator and Doppler. Most images we deploy to a Kubernetes cluster come from a private container registry. Typical...Discuss·52 readsKubernetes
Argonautargonaut.hashnode.dev·Jan 23, 2023Secret Management in Kubernetes: Approaches, Tools, and Best PracticesKubernetes Secrets are where Kubernetes stores secret objects such as passwords, OAuth tokens, sensitive data, and SSH keys. It is stored in the Kubernetes controller and is kept separate from the pods where your application runs. The name secret is ...Discuss·42 readsKubernetes
ARPAN MONDALarpanunzip.hashnode.dev·Dec 13, 2022The Rise of DevSecOpsThe rise of DevSecOps has brought significant changes to the way software is developed and maintained. DevSecOps, a term coined by combining the words "development," "security," and "operations," is a software development philosophy that emphasizes c...Discuss·47 readsDevSecOps
Dotan Nahumjondot.hashnode.dev·Nov 19, 2022How to do pipeline forensics, DFIR, or just find files quickly with ReconRecon is an open source tool built in Rust 🦀, with great performance and ergonomics for finding files. You might want to: Run some validations or checks in your pipeline — for example, not producing binary files while building Javascript, Or you mi...Discuss·62 readsSecurity
Daniel Adeboyeadeboyedn.hashnode.dev·Sep 26, 2022Onboardbase Vs Env FileAs a developer, we primarily use the .env file to store environment configs and secrets during development. It gets tricky when we have more than one developer working on a project due to the need for these environment configs and secrets by other te...Discuss·137 readsEnvironment