Tag: Infosec
-
Qualcomm: Generative AI and impressive diversification signal a new era of growth
Posted on June 22, 2024, Level beginner Resource Length short
QCOM's entry into the AI chips market seems promising, with MSFT endorsing the ARM-based Snapdragon X Elite CPU chips as the "fastest, most AI-ready PC ever built." By Juxtaposed Ideas.
Tags infosec management ai cio machine-learning
-
To end burnout, cybersecurity must tolerate failure
Posted on June 15, 2024, Level beginner Resource Length medium
At Gartner Security and Management Summit, speakers explained that you can't buy your way out of cybersecurity burnout. They discussed how a shift from a protection-focused program to a response-focused security strategy can help. By Ijeoma S. Nwatu.
Tags infosec management web-development cio
-
How to kill a process in Linux: Commands and best practices
Posted on May 29, 2024, Level beginner Resource Length short
There are multiple situations where it is necessary to terminate a Linux process – for example, when the program does not respond or freezes. Learning how to kill a process properly is a vital skill that can help keep your various systems healthy and functioning optimally. By Jeff Smith.
Tags linux app-development infosec web-development servers
-
Web scraping with PHP: Step-by-step tutorial
Posted on May 17, 2024, Level beginner Resource Length medium
In this article, you'll learn to build a PHP web scraper, from the basics to more advanced techniques. By zenrows.com.
Tags php app-development infosec web-development
-
Securing Kafka communication channels on Kubernetes with TLS/mTLS
Posted on May 1, 2024, Level intermediate Resource Length medium
The article covers a guide on setting up TLS/Mutual TLS (mTLS) for securing communication between Kafka clients and servers, specifically in a Kubernetes environment, thus mitigating potential threats such as man-in-the-middle attacks and unauthorized access to data. We'll be starting off by diving into a bunch of topics that'll help you understand why we're doing what we're doing for our setup. By Aranya Chauhan.
Tags devops app-development infosec kubernetes ssl
-
Implement security breach prevention and recovery infrastructure
Posted on April 30, 2024, Level intermediate Resource Length medium
As part of Zero Trust adoption guidance, this article is part of the Prevent or reduce business damage from a breach business scenario and describes how to protect your organization from cyberattacks. This article focuses on how to deploy additional security measures to prevent a breach and limit its spread and to create and test a business continuity and disaster recovery (BCDR) infrastructure to more quickly recover from a destructive breach. By BrendaCarter, joe-davies-affirm and MicrosoftGuyJFlo.
Tags devops azure ssl app-development infosec teams servers
-
Apache web server hardening and security guide
Posted on April 21, 2024, Level intermediate Resource Length medium
The Web Server is a crucial part of web-based applications. Apache Web Server is often placed at the edge of the network; hence it becomes one of the most vulnerable services to attack. A practical guide to secure and harden Apache HTTP Server. By Chandan Kumar.
Tags apache web-development cloud software-architecture infosec
-
DevOps security: Definition, best practices
Posted on March 22, 2024, Level beginner Resource Length long
DevOps has revolutionized the way organizations develop, deploy, and maintain applications. However, upholding security in a DevOps environment is a serious concern organizations must address in order to keep software development isolated from cyber threats while maintaining agility, production speed, and cross-team collaboration. By Anastazija Spasojevic.
Tags devops infosec cloud software-architecture learning
-
Using containerisation
Posted on February 18, 2024, Level beginner Resource Length long
Guidance on how to build and use containerised applications securely. Containers are a common approach for packaging and deploying applications, standardised by the Open Container Initiative (OCI). By National Cyber Security Centre.
Tags devops web-development app-development containers infosec kubernetes
-
Secure GraphQL endpoints in Spring reactive applications
Posted on December 25, 2023, Level intermediate Resource Length medium
Spring Supports GraphQL requests over HTTP, Websockets and RSockets. Securing an Spring GraphQL application does not differ from securing a Web application. Mainly, Spring GraphQL needs to ensure context propagates from WebFlux to the data fetching layer so that we can use Security annotations or access the authenticated principal in @SchemaMapping methods. This should work for HTTP and WebSocket. By Ruchira Madhushan Rajapaksha.
Tags apis infosec java restful web-development app-development
-
Using JWTs to authenticate services unravels API gateways
Posted on December 20, 2023, Level intermediate Resource Length medium
The API gateway component in a cloud native architecture is critical because it offloads critical API security and policy functionality to a common place, allowing the backend APIs and services to focus on business logic. API authentication, authorization, audit, throttling and similar tasks can be complex and difficult to get right, so many organizations choose an API gateway to handle them. By Christian Posta and Peter Jausovec.
Tags apis infosec java web-development app-development
-
TLS vs SSL: What's the difference? Which one should you use?
Posted on December 19, 2023, Level beginner Resource Length medium
Both TLS and SSL are protocols that help you securely authenticate and transport data on the Internet. But what's the difference between TLS vs SSL? And is it something you need to worry about? By kinsta.com.
Tags miscellaneous infosec browsers web-development ssl