Abhiramcloudbuddy.hashnode.dev·Oct 29, 2024Supply Chain Attacks: Securing Your Software from Third-Party CodeIn today's interconnected world, software applications increasingly rely on third-party components. While these components can accelerate development and provide valuable functionality, they also introduce new security risks. Supply chain attacks, wh...Discusssupplychainsecurity
Krzysztof KałamarskiProkkalamarski.me·Oct 17, 2024Automate Your Web Security: Mastering Authenticated ZAP Scans with the ZAP Automation FrameworkAs developers, we strive to deliver secure systems to our clients. However, with large applications and hundreds of potential vulnerabilities and attacks, performing manual security testing for each new release can be a daunting task. Fortunately, th...Discusszap
Tanishka Marrottcloud-design-diaries.hashnode.dev·Oct 13, 2024Mastering Container Security (Real-Practical Steps for Building Safer, Resilient Workloads)Containerized environments have taken over modern infrastructure, but with great convenience comes even greater security risks. Let’s face it, securing containers isn’t optional—it’s mandatory. And if you’re still deploying containers without giving ...Discuss·2 likessecure docker file
Abhiramcloudbuddy.hashnode.dev·Aug 10, 2024Vulnerability Management for the Cloud: Securing Your Cloud InfrastructureThe cloud has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, with these benefits come unique security challenges. One of the most critical aspects of cloud security is vulnerability managem...DiscussVulnerability management
Abhiramcloudbuddy.hashnode.dev·Jul 26, 2024The Future of Vulnerability ManagementThe cybersecurity landscape is constantly evolving, with new threats emerging daily. Traditional vulnerability management practices, while essential, are often struggling to keep pace with the rapid changes in technology and the sophistication of cyb...DiscussVulnerability management
Cloud Tunedcloudtuned.hashnode.dev·Jun 28, 2024Exploring Detectify: Advancing Web Application SecurityExploring Detectify: Advancing Web Application Security Introduction As web applications continue to evolve and become more complex, ensuring their security has become a top priority for organizations. Detectify is a leading web application security ...DiscussDetectify
Cloud Tunedcloudtuned.hashnode.dev·Jun 27, 2024Exploring AuditJS: Enhancing JavaScript Dependency SecurityExploring AuditJS: Enhancing JavaScript Dependency Security Introduction As modern web applications rely heavily on third-party dependencies, ensuring the security of these dependencies has become a critical concern for developers. AuditJS is a power...Discussaudit-js
Cloud Tunedcloudtuned.hashnode.dev·Jun 26, 2024Unveiling Snyk: Simplifying Open Source SecurityUnveiling Snyk: Simplifying Open Source Security Introduction With the widespread adoption of open-source software, managing dependencies and ensuring their security has become a critical aspect of modern software development. Snyk is a comprehensive...Discusssnyk
Cloud Tunedcloudtuned.hashnode.dev·Jun 25, 2024Exploring Brakeman: Enhancing Ruby on Rails SecurityExploring Brakeman: Enhancing Ruby on Rails Security Introduction Ruby on Rails is a popular web application framework known for its productivity and ease of development. However, like any web framework, Ruby on Rails applications are susceptible to ...Discussbreakman
aisha javedcyberurdu.hashnode.dev·Jun 25, 2024Cybersecurity Level 2 - Hacking within Lab"سائبر سیکیورٹی کے ماہر بنیں اور جدید خطرات کے خلاف ہینڈ آن لیبز کے ساتھ دفاع کریں، بشمول کلائنٹ سائیڈ کے غلط استعمال اور سوشل انجینئرنگ کے حملے۔" کورس کا عنوان: سائبرسیکیوریٹی لیول 2 - لیب کے اندر ہیکنگ اس مضمون میں میں آپ کو بتاؤں گا کہ سائبرسیکیور...DiscussIntermediate Cybersecurity