Tag: Infosec
-
Don't know what to monitor? L.E.T.S. Start with 4 Metrics!
Posted on December 1, 2022, Level beginner Resource Length medium
"We paid for a bunch of tools but we don't know what we should be looking at. There are tons of charts that don't seem to mean anything!" Software monitoring, how does it work? By Jeremy Hicks.
Tags monitoring infosec cloud servers app-development serverless web-development
-
Microsoft says it's just too difficult to effectively disrupt ransomware
Posted on November 30, 2022, Level beginner Resource Length medium
The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy. By Connor Jones.
Tags cio infosec cloud miscellaneous
-
Implementing TLS in Java
Posted on November 29, 2022, Level intermediate Resource Length short
TLS, or transport layer security, is a protocol used across the globe to encrypt and secure communication over the internet. In this article, we'll discuss what TLS is, what benefits it provides, and why you need it. Then we'll walk through implementing TLS in Java. By Himanish Munjal.
Tags app-development java ssl infosec programming
-
NGINX ingress controller hardening guide
Posted on November 27, 2022, Level intermediate Resource Length short
This guide describes, what of the different configurations described in those guides is already implemented as default in the nginx implementation of kubernetes ingress. By @kubernetes.github.io.
Tags nginx infosec devops cloud distributed apis servers
-
NGINX WAF and Kubernetes WAF options (App Protect vs. open-appsec)
Posted on November 26, 2022, Level intermediate Resource Length short
Until 2022, NGINX supported the well-known ModSecurity open-source WAF solution and OWASP Core RuleSet Signatures. However, following Trustwaves End-of-Life notice about ModSecurity, and possibly related also to the acquisition of NGINX by F5, NGINX announced in May 2022 that it will end of life ModSecurity, leaving NGINX open-source with no open-source security solution. By Christopher Lutat.
Tags infosec devops cloud nginx servers
-
Service exhaustion floods — HTTP/HTTPS flood, HTTP pipelining, and SSL renegotiation DDoS attack
Posted on November 25, 2022, Level beginner Resource Length medium
On 1 June 2022, a Google Cloud Armor customer was hit with a Distributed denial-of-service (DDoS) attack over the Hypertext Transfer Protocol Secure (HTTPS) protocol that reached 46 million requests per second (RPS), making it one of the largest ever recorded Layer 7 DDoS attacks reported this year. By Debashis Pal.
Tags infosec ssl app-development cloud cio devops
-
Three reasons why CISOs need to understand domain security
Posted on November 16, 2022, Level beginner Resource Length medium
Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. An attack on a web domain can lead to the redirection of a company's website, domain spoofing, phishing attacks, network breaches, and business email compromise (BEC). By cscdbs.com.
Tags cio web-development app-development infosec
-
Building a secure SaaS application with Amazon API Gateway and Auth0 by Okta
Posted on November 8, 2022, Level beginner Resource Length long
Most applications require a form of identity service to manage, authenticate, and authorize users. In software-as-a-service (SaaS) applications, multi-tenancy adds specific challenges to this task that are important aspects to consider when designing a multi-tenant identity management service. By Humberto Somensi.
Tags apis serverless infosec cloud app-development web-development microservices
-
Block ads on every device in your house with a Raspberry Pi and Pi-hole
Posted on October 29, 2022, Level intermediate Resource Length long
Stress and burnout are having a massive impact on cybersecurity teams, leaving people and businesses more vulnerable than ever. Cybersecurity professionals are "reaching their breaking point" as ransomware attacks increase and create new risks for people and businesses. By Owen Hughes.
Tags infosec linux robotics iot web-development app-development
-
Cybersecurity teams are reaching their breaking point. We should all be worried
Posted on October 28, 2022, Level beginner Resource Length long
Stress and burnout are having a massive impact on cybersecurity teams, leaving people and businesses more vulnerable than ever. Cybersecurity professionals are "reaching their breaking point" as ransomware attacks increase and create new risks for people and businesses. By Owen Hughes.
Tags infosec linux teams cio web-development app-development
-
Exploring the JWT attacks landscape
Posted on October 22, 2022, Level intermediate Resource Length medium
Due to its popularity, JWT attacks are one of of the most exploited vulnerability by attackers. Each JWT contains base64 encoded JSON objects. By Aamir Ahmed.
Tags infosec devops web-development app-development
-
What is a Web3 browser and how does it work?
Posted on October 20, 2022, Level beginner Resource Length medium
Web3 browsers like Brave allow users to access DApps, integrate cryptocurrencies and surf over the decentralized web with greater privacy and security. The phrase "Web3" is used to characterize multiple evolutions of web interaction and usage along various paths, including creating a geospatial web, utilizing artificial intelligence tools and making content available through numerous non-browser apps or Web3 browsers. By Onkar Singh.
Tags browsers miscellaneous crypto infosec