Tag: Infosec
-
Authenticating Vuepress apps with Auth0
Posted on February 25, 2021, Level intermediate Resource Length short
Learn how to create your first VuePress site and add Authentication with Auth0. By Fikayo Adepoju.
Tags web-development frontend nodejs javascript app-development infosec
-
Realizing the full potential of DevSecOps
Posted on February 10, 2021, Level beginner Resource Length medium
An article about four strategies to achieve a true DevSecOps culture. For federal agencies, achieving mission success increasingly hinges on modernizing legacy systems and transforming operations. By Phoebe Nerdahl @Atlassian.com.
Tags devops management cio cloud infosec app-development
-
CSO's ultimate guide to security and privacy laws, regulations, and compliance
Posted on February 8, 2021, Level beginner Resource Length long
This handy directory provides summaries and links to the full text of each security or privacy law and regulation. By csoonline.com.
Tags cio miscellaneous infosec teams cloud
-
Can you trust Zero Trust?
Posted on January 22, 2021, Level beginner Resource Length short
The days of implicitly trusting connected devices that are behind the traditional enterprise firewalled network with its "hard" perimeter are no longer. By Jason Soroko.
Tags devops infosec teams cio management
-
Firestore and authentication
Posted on January 11, 2021, Level beginner Resource Length medium
Firebase authentication makes it easy to add user identities to your app. When combined with Firestore, it can help to secure user data. By Steve Marx.
Tags nosql software infosec database
-
Docker for Java developers: 5 things you need to know not to fail your security
Posted on January 6, 2021, Level beginner Resource Length short
In this article we will focus on the Docker container security aspects related to building a Docker image, reducing the security vulnerabilities count introduced by Docker base images as well as Dockerfile security best practices. By Liran Tal and Omer Levi Hevroni.
Tags infosec containers docker java miscellaneous
-
How to SSH into a Docker container
Posted on January 4, 2021, Level intermediate Resource Length medium
How do you use SSH to enter a Docker container? The traditional approach consists of two step. By Debdut Chakraborty.
Tags containers docker devops infosec how-to
-
Serverless decision service
Posted on December 18, 2020, Level beginner Resource Length medium
Serverless is definitely a trend that enables organisations to just manage what matters to them rather than the whole infrastructure to run their business. Serverless Decision Service seems to be an answer to business agility that drives the business performance as it will take the worry and efforts of how to run operational decisions away from organisations. By Arash Aghlara.
Tags microservices serverless infosec event-driven
-
Handling webhooks with EventBridge, SAM and SAR
Posted on December 17, 2020, Level intermediate Resource Length medium
Applications author worked on in the last decade were rarely isolated from the rest of the world. Most of the time, they had many interactions with other applications out there. From time to time, some of these integrations are using WebSockets, which makes our integration realtime. By Slobodan Stojanović.
Tags microservices apis serverless infosec event-driven messaging aws
-
Auth0 introduces adaptive MFA
Posted on December 15, 2020, Level beginner Resource Length medium
Adaptive MFA improves security and customer experience. According to Dashlane, the average US internet user has over 150 online accounts, with that number projected to double by 2022. By Randy Nasson and Antonio Fuentes.
Tags infosec devops software-architecture learning cio
-
How payment transaction processing works
Posted on December 11, 2020, Level beginner Resource Length short
Payment transactions occur in a matter of seconds. We can easily swipe our credit card or touch to pay, and there's an instant exchange of value. But it's not as simple as it seems. Behind every digital transaction is an intricate web of processes that enables nearly $2 trillion in payment volume. By privacy.com.
Tags infosec miscellaneous learning cio
-
Azure Container Registry: Securing container workflows
Posted on December 10, 2020, Level intermediate Resource Length short
Securing any environment requires multiple lines of defense. Azure Container Registry recently announced the general availability of features like Azure Private Link, customer-managed keys, dedicated data-endpoints, and Azure Policy definitions. These features provide tools to secure Azure Container Registry as part of the container end-to-end workflow. By Reshmi Mangalore Senior Program Manager.
Tags infosec devops cloud containers azure