YiliaforAPI7api7.hashnode.dev·Mar 13, 2024What's New in API7 Enterprise: Token ManagementBasic Concepts and Functions of Access Token In modern web applications, the access token is widely used for authentication and authorization purposes. For user login sessions, the server generates a login token after verifying the user's identity. T...Discuss·87 likes·53 readstoken
Lionel Owonoblog.esperluet.xyz·18 hours agoCloud Migration: .Net Framework challenges with KerberosIntroduction When transitioning to the cloud, numerous aspects require consideration, with security standing out as a pivotal concern, particularly in terms of authentication and authorization. Authentication involves validating that an entity (user,...Discuss·10 likesAzure
Mithilesh Gaikwadesymith.hashnode.dev·7 hours agoEnhancing Code Safety with #pragma Poison in GCCIn the realm of software development, ensuring code safety is a paramount concern that underpins the reliability and integrity of software systems. As developers navigate the complexities of programming, they rely on powerful tools and methodologies ...DiscussC
Livingstone Del Montelivimonte.hashnode.dev·9 hours agoSecure Database Connection on AWS using RDS, SSM and EC2When operating in a cloud environment, there are various ways to establish a connection with a database. Ensuring security is essential, which is why we often opt for using an EC2 instance as a bastion host in a public subnet. This allows authenticat...DiscussAWS
Hemanthhemanthgangula.hashnode.dev·21 hours agoOptimizing Software Delivery: Creating an End-to-End CI/CD PipelineIn my quest to sharpen my skills and make a tangible impact in the world of software engineering, I embarked on an ambitious project to develop an end-to-end CI/CD pipeline for the BoardgameListingWebApp. With an eye toward efficiency and quality, I ...Discuss·160 readsci-cd
Jay Tillujaytillu.in·a day agoWhat is a Firewall in Networking?A firewall is a security system that acts as a gatekeeper for your computer network. It monitors incoming and outgoing traffic based on a set of rules, deciding whether to allow or block specific data packets. In essence, it creates a barrier between...DiscussCybersecurity#cybersecurity
DbVisualizerforThe Tablethetable.hashnode.dev·Mar 18, 2024Quick Fix for "sudo mysql_secure_installation: command not found" in MariaDBStruggling with a sudo mysql_secure_installation: command not found message in MariaDB? Here's a brief yet comprehensive solution guide. Common Reasons MariaDB Not Installed: Verify with sudo apt install mariadb-server. MariaDB Not Active: Check wi...DiscussMariaDB
Anthony Watblog.avangards.io·Mar 17, 2024How To Implement AWS SSB Controls in Terraform - Part 2Introduction The AWS Startup Security Baseline (SSB) defines a set of controls that comprises a lean but solid foundation for the security posture of your AWS accounts. In part 1 of our blog series, we examined how to implement account controls relat...Discuss·29 readsHow to implement the AWS Startup Security Baseline (SSB) using TerraformAWS
Anthony Watblog.avangards.io·Mar 17, 2024How To Implement AWS SSB Controls in Terraform - Part 1Introduction In my AWS consultant role, I have helped numerous organizations with building a landing zone or reviewing their existing AWS environment against best practices and recommend remediations, with a focus on security. Many of them happen to ...Discuss·62 readsHow to implement the AWS Startup Security Baseline (SSB) using TerraformAWS
Ben-Hur Santos OttforGuia de AppSec :: Blogblog.guiadeappsec.com.br·Mar 17, 2024AppSec Newsletter 0027Links [artigo] Opening Pandora’s box - Supply Chain Insider Threats in Open Source projects [artigo] Docker Security – Step-by-Step Hardening (Docker Hardening) (um dos guias mais completos que já vi) [ferramenta] Secret scanning AI-generated cust...Discuss·1 like·49 readsappsec
Osama Shaikhblog.osshaikh.com·Mar 17, 2024Azure HSM: Navigating RBI Compliance for FSIIntroduction As a technology enthusiast I recently had the opportunity to dive deep into the world of Azure Managed Hardware Security Modules (HSMs) for FSI customer. These powerful cryptographic guardians play a pivotal role in helping Non-Banking F...Discuss·56 reads#FSI