Mohit Singhdevopsdude-1722024120028.hashnode.dev·3 hours ago“Securing Success: The Role of CI/CD in Software Development”Let’s explore how Continuous Integration (CI) and Continuous Delivery (CD) practices impact security in software development: Automated Security Testing: CI/CD pipelines incorporate automated security assessments, such as static code analysis and vul...DiscussDevops
VerifyVaultverifyvault.hashnode.dev·9 hours agoThe Cybersecurity Revolution: 2024’s Most Game-Changing Trends You Need to KnowIn the fast-paced world of cybersecurity, staying ahead of threats is crucial for both individuals and businesses. As we continue through 2024, several emerging trends are poised to redefine how we approach digital security. Here’s what you need to k...Discuss2FA
Shahnawaz Khanshahnawaz.hashnode.dev·11 hours agoEnforce Power BI model securityToday I earned my "Enforce Power BI model security" badge! I’m so proud to be celebrating this achievement and hope this inspires you to start your own @MicrosoftLearn journey! Keep up the great work!! Click to see my new achievementDiscussPowerBI
Prem Kaneriya premkaneriya.hashnode.dev·14 hours agoBasics of JWT Authentication and Authorization You Need to KnowAuthentication Authentication is the process of verifying who you are. Tokens: In many systems, there are two types of tokens used in the authentication process: access tokens and refresh tokens. Access Token: This is a short-lived token that allow...Discuss·1 likeJWT
Tran Hoang PhongforFIS Securityblog.fiscybersec.com·21 hours agoCVE-2024-36991 - Lỗ hổng nghiêm trọng trên Splunk có thể bị khai thác để đọc tất cả file trên hệ thốngCác nhà nghiên cứu bảo mật đã đưa ra cảnh báo về một lỗ hổng Splunk Enterprise có thể cho phép kẻ tấn công đọc mọi file trên hệ thống. Lỗ hổng nghiêm trọng hơn so với lúc ban đầu nó xuất hiện và có thể bị khai thác bằng một GET request đơn giản. 1. C...DiscussNewslettersCVE
Irshit mukherjeeirshitmukherjee55.hashnode.dev·Jul 25, 2024Deploy Three tier application with Terraform & AWSWhat is three-tier Tier Architecture? Before moving on, it's essential to understand what three-tier architecture is. If you're already familiar with it, you can skip this part. Three-tier architecture is a deployment design pattern in the cloud that...Discuss·7 likes·39 readsAWS
Yogendra Porwalqasimple.hashnode.dev·Jul 25, 2024Integrating OWASP ZAP Scans into Selenium TestsIn today's web-driven world, robust web application security is an absolute necessity. Even minor vulnerabilities can have catastrophic consequences, leading to data breaches, financial losses, and reputational damage.Consider a crypto trading platfo...DiscussSecuritytools and tip
VerifyVaultverifyvault.hashnode.dev·Jul 25, 2024Unveiling the Shield: The Truth About End-to-End EncryptionIn an era where digital privacy is more valuable than ever, understanding end-to-end encryption (E2EE) can empower you to safeguard your personal information effectively. Imagine a digital lock that only you and your intended recipient possess the ke...Discuss·1 like2FA
RivanorthProblog.rivanorth.com·Jul 25, 2024Hack Explained - Rho MarketRho Markets is a decentralised finance (DeFi) platform built on the Ethereum Layer 2 solution, Scroll. It provides lending and borrowing services within the blockchain ecosystem. Recently, Rho Markets suffered a security breach resulting in the loss ...DiscussWeb3Blockchain
Antoniantobuilds.hashnode.dev·Jul 24, 2024Safeguarding Your Codebase With GitGuardianThis article is inspired by an email I received today about a minor mistake I made (used as the article topic). Thanks to GitGuardian integration on my GitHub account, I was notified promptly. In today's digital age, where software development is at ...DiscussGitHub