Thabelo Ramabulanathab310.hashnode.dev·11 hours agoKubernetes Network Policies simplifiedEver been to a concert or event where there are different security checkpoints? Each section of the event might have guards that control who can come in and out. This is a lot like how Kubernetes Network Policies work in your cluster. 🔐 Imagine this...DiscussKubernetes
Naren Pnaren4b.hashnode.dev·19 hours ago🦭Step-by-Step Guide to Setting Up Multiple Kind Clusters on a Single Host🦭In this blog post, I explain how to Step-by-Step Guide to Setting Up Multiple Kind Clusters on a Single Host and set up secure communication between pods in different clusters. Whether you're looking to enhance your Kubernetes knowledge, or simply in...DiscussKubernetes
Rosecurifylog.rosecurify.com·21 hours agoSeclog - #91"Build your network as you would a fortress; with layers, deception, and traps for the unwary." - The Art of Cyber War 📚 SecMisc bug.directory - Description not provided - Read More x86re - Description not provided - Read More 📰 SecLinks GAZEp...DiscussseclogSecurity
Bernard Ngandungandu.hashnode.dev·a day agoDecoupling your application's User Model from Symfony's Security SystemIntroduction When building Symfony applications with advanced architectural patterns like hexagonal architecture, the primary goal is often to decouple the domain (business logic) from the infrastructure (technical choices). This separation allows fo...Discuss·263 readsSymfony
Jose gallegojosegallego.hashnode.dev·Sep 14, 2024Subida de Archivos a S3: ¿Directamente Desde el Frontend o a Través del Backend?Cuando se trata de manejar archivos o imágenes, Amazon S3 es una solución muy popular gracias a su escalabilidad y flexibilidad. Sin embargo, surge una pregunta común al implementarlo: ¿Deberíamos enviar los archivos directamente desde el frontend a ...Discuss·2 likesSecurity
Subhanshu Mohan Guptablogs.subhanshumg.com·Sep 14, 2024AI-Driven Infrastructure as Code (IaC) Security: Preventing Misconfigurations in DevSecOpsAs modern infrastructure becomes more complex, misconfigurations in Infrastructure as Code (IaC) can introduce significant security vulnerabilities. Detecting these issues early is crucial for preventing costly breaches in production. This is where A...Discussbridgecrew
Md Shahriyar Al Mustakim Mitulmitul-shahriyar.hashnode.dev·Sep 14, 2024Linux Foundation Certified System Administrator (LFCS) : Linux security (Part 4)Within Linux , we need to keep these in mind: Access controls : Use of password based authentication to know who can access which files. PAM : Plugable authentication model. Use to authenticate users to programs and services Network security : Used ...DiscussLinux
Vishad Patelvishad.hashnode.dev·Sep 14, 2024Boost Node.js Security: A Guide to Two-Factor AuthenticationIntroduction Explanation of Two-Factor Authentication (2FA) Two-Factor Authentication (2FA) is a security process that enhances the protection of your online accounts by requiring two different forms of identification before granting access. This met...DiscussEssential Software Development Tools and Techniques2FA
Alla Yasheelacloud-z.hashnode.dev·Sep 14, 2024Azure Storage ServicesIn this post, we'll explore Azure Storage Services and different methods for storing data in the cloud. It's an easy concept once you understand the basics, so let's dive in! Understanding the What and Why When learning a new concept, it's helpful to...DiscussAzureDevOpsazure storage accounts
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Sep 13, 2024Maximizing Kubernetes Security with Kube Hunter: A Comprehensive GuideOverview :- Kubernetes has become a popular platform for managing containerized applications, but it also comes with security challenges. Kube Hunter is a valuable tool that helps identify potential vulnerabilities in Kubernetes clusters. This blog p...Discusskubehunter