Tag: Infosec
-
Are separate Kubernetes clusters secure? Why sprawl increases risk
Posted on March 21, 2026, Level beginner Resource Length medium
This article challenges the conventional wisdom of using separate Kubernetes clusters for enhanced security. As organizations scale, cluster sprawl can lead to inconsistent configurations, increased vulnerabilities, and operational overhead. The article argues for a more nuanced approach to tenancy, using virtual clusters to enforce consistent security policies and reduce the complexity of managing multiple clusters. By vcluster.com.
Tags kubernetes infosec management cio devops
-
5 Linux servers that let you ditch the public cloud and reclaim your privacy - for free
Posted on March 17, 2026, Level beginner Resource Length medium
Five free, privacy-first Linux server distributions that empower users to self-host with minimal technical expertise and full control over their data. By Steven Vaughan-Nichols.
Tags linux servers infosec miscellaneous
-
Moving beyond knowledge-based authentication
Posted on February 24, 2026, Level beginner Resource Length medium
The shift away from knowledge based authentication (KBA) is not just a technological upgrade; it is a necessary evolution to secure digital interactions in a world where generative AI has obliterated the assumptions that KBA depends on. By Matt Moed.
Tags infosec ai cio management learning
-
Product Information Management (PIM) login security
Posted on February 19, 2026, Level beginner Resource Length short
Enhance your Privileged Identity Management (PIM) security with role-based authentication that adapts to real-world workflows and minimizes unauthorized access without hindering productivity. By MojoAuth.
Tags infosec ai cio management
-
Application security: Getting more out of your pen tests
Posted on February 17, 2026, Level intermediate Resource Length long
Maximize the value of application penetration tests with clear objectives, proper scoping, and effective communication to uncover real risks and drive meaningful remediation. By bishopfox.com.
Tags infosec app-development cloud performance
-
How to stop directory traversal attacks in Python
Posted on February 5, 2026, Level intermediate Resource Length medium
Directory Traversal is a common but dangerous vulnerability that can affect applications when file paths are built using untrusted user input, or when file paths are used with unchecked input. Python applications are not immune to directory traversal attacks. By Maikel.
Tags python app-development infosec learning
-
What AWS Security learned from responding to recent npm supply chain threat campaigns
Posted on January 28, 2026, Level intermediate Resource Length medium
AWS details its response to recent npm supply chain attacks, emphasizing proactive detection, rapid response, and collaborative threat intelligence sharing. By Nikki Pahliney, Chi Tran, Albin Vattakattu, Charlie Bacon, Dan Dutrow, David Magnotti, Jeff Laskowski, Stephen Goodman, and Ryan Tick.
Tags app-development big-data infosec management aws
-
How to integrate Azure security center with Azure monitor alerts
Posted on January 20, 2026, Level intermediate Resource Length medium
Stream Azure Security Center alerts and recommendations to Azure Monitor for enhanced visibility, custom dashboards, and automated responses to security events. By Charbel Nemnom.
Tags azure streaming cloud infosec devops
-
Is a CIAM Certification Beneficial?
Posted on November 16, 2025, Level beginner Resource Length medium
This article covers the benefits of obtaining a CIAM certification, what it entails, and who it's most useful for. We'll walk through the core competencies, career advancement opportunities, and how these certs stack up against other security and development credentials, it also help you decide if it's the right move for your career in authentication and software development. By Victor Singh.
Tags programming app-development infosec teams career
-
Why sudo-rs brings modern memory safety to Ubuntu 26.04
Posted on November 8, 2025, Level beginner Resource Length medium
Enhancing Ubuntu security with rust-based sudo: a modern approach to memory safety. By Steven J. Vaughan-Nichols.
Tags linux infosec how-to cio
-
Free Windows web server with a Lets Encrypt SSL certificate in AWS
Posted on October 23, 2025, Level beginner Resource Length medium
Setting up a free Windows web server with Let's Encrypt SSL on AWS EC2 is surprisingly straightforward, even for those without extensive experience. By Angus Fox.
Tags infosec azure app-development ssl web-development
-
How proxy servers enhance security in modern authentication systems
Posted on October 21, 2025, Level beginner Resource Length long
Proxies provide critical layers of security, privacy and control that authentication systems need to thrive in today's dynamic threat landscape. By MojoAuth - Advanced Authentication & Identity Solutions.
Tags infosec servers app-development ssl web-development