Tag: Infosec
-
Moving beyond knowledge-based authentication
Posted on February 24, 2026, Level beginner Resource Length medium
The shift away from knowledge based authentication (KBA) is not just a technological upgrade; it is a necessary evolution to secure digital interactions in a world where generative AI has obliterated the assumptions that KBA depends on. By Matt Moed.
Tags infosec ai cio management learning
-
Product Information Management (PIM) login security
Posted on February 19, 2026, Level beginner Resource Length short
Enhance your Privileged Identity Management (PIM) security with role-based authentication that adapts to real-world workflows and minimizes unauthorized access without hindering productivity. By MojoAuth.
Tags infosec ai cio management
-
Application security: Getting more out of your pen tests
Posted on February 17, 2026, Level intermediate Resource Length long
Maximize the value of application penetration tests with clear objectives, proper scoping, and effective communication to uncover real risks and drive meaningful remediation. By bishopfox.com.
Tags infosec app-development cloud performance
-
How to stop directory traversal attacks in Python
Posted on February 5, 2026, Level intermediate Resource Length medium
Directory Traversal is a common but dangerous vulnerability that can affect applications when file paths are built using untrusted user input, or when file paths are used with unchecked input. Python applications are not immune to directory traversal attacks. By Maikel.
Tags python app-development infosec learning
-
What AWS Security learned from responding to recent npm supply chain threat campaigns
Posted on January 28, 2026, Level intermediate Resource Length medium
AWS details its response to recent npm supply chain attacks, emphasizing proactive detection, rapid response, and collaborative threat intelligence sharing. By Nikki Pahliney, Chi Tran, Albin Vattakattu, Charlie Bacon, Dan Dutrow, David Magnotti, Jeff Laskowski, Stephen Goodman, and Ryan Tick.
Tags app-development big-data infosec management aws
-
How to integrate Azure security center with Azure monitor alerts
Posted on January 20, 2026, Level intermediate Resource Length medium
Stream Azure Security Center alerts and recommendations to Azure Monitor for enhanced visibility, custom dashboards, and automated responses to security events. By Charbel Nemnom.
Tags azure streaming cloud infosec devops
-
Is a CIAM Certification Beneficial?
Posted on November 16, 2025, Level beginner Resource Length medium
This article covers the benefits of obtaining a CIAM certification, what it entails, and who it's most useful for. We'll walk through the core competencies, career advancement opportunities, and how these certs stack up against other security and development credentials, it also help you decide if it's the right move for your career in authentication and software development. By Victor Singh.
Tags programming app-development infosec teams career
-
Why sudo-rs brings modern memory safety to Ubuntu 26.04
Posted on November 8, 2025, Level beginner Resource Length medium
Enhancing Ubuntu security with rust-based sudo: a modern approach to memory safety. By Steven J. Vaughan-Nichols.
Tags linux infosec how-to cio
-
Free Windows web server with a Lets Encrypt SSL certificate in AWS
Posted on October 23, 2025, Level beginner Resource Length medium
Setting up a free Windows web server with Let's Encrypt SSL on AWS EC2 is surprisingly straightforward, even for those without extensive experience. By Angus Fox.
Tags infosec azure app-development ssl web-development
-
How proxy servers enhance security in modern authentication systems
Posted on October 21, 2025, Level beginner Resource Length long
Proxies provide critical layers of security, privacy and control that authentication systems need to thrive in today's dynamic threat landscape. By MojoAuth - Advanced Authentication & Identity Solutions.
Tags infosec servers app-development ssl web-development
-
How to generate Signed SSL certificates on Synology NAS
Posted on October 20, 2025, Level beginner Resource Length medium
This tutorial video by SpaceRex explains how to obtain a signed SSL certificate using Let's Encrypt, a crucial step for secure and trusted internet access on your Synology NAS. A properly signed SSL certificate ensures encrypted data exchanges between your NAS and users, preventing “certificate not trusted” errors. By Julian Horsey.
Tags infosec servers ssl miscellaneous
-
What port does SFTP really use and why is it confused with FTP's port 21?
Posted on October 19, 2025, Level beginner Resource Length long
Why SFTP's port is often mistaken for FTPS and how the confusion hurts developers. By Alex Lim.
Tags infosec servers app-development ssl miscellaneous