59 posts tagged #security
- aws-jwt-verify v3.0.0 Released
March 29, 2022 #aws #opensource #security - I'm a Microsoft Azure Security Engineer Associate
January 22, 2021 #azure #security #certification - Azure Managed Identity Resources
October 10, 2020 #azure #security #iam #cli - 7 Multi-Cloud Governance Best Practices
September 12, 2020 #cloud #security #architecture - What is the OWASP Cyber Defense Matrix?
August 12, 2020 #cloud #security #owasp - Introduction to the NIST Cybersecurity Framework
June 26, 2020 #cloud #security #nist - Understanding CIS Controls and Benchmarks
June 11, 2020 #cloud #security #cis - Connecting to Azure Cache for Redis from RedisInsight
May 20, 2020 #azure #redis #security #networking - Veracode API HMAC Authentication in Python
September 6, 2019 #security #codequality #python - Using the JFrog Artifactory CLI with API Keys or Access Tokens
August 21, 2019 #devops #cli #security - Scanning for OWS SQL Injection Protection
August 12, 2019 #security #codequality #devops #powershell - AWS Signature Authorization using Postman
July 7, 2019 #http #aws #security - Programmatically Adding IP Restrictions to an Azure App Service
June 14, 2019 #security #azure #powershell #cloudshell - File Verification of a SHA-256 Hash using PowerShell
April 14, 2019 #powershell #security - X-XSS-Protection is Dead, Long Live Content-Security-Policy
October 11, 2018 #http #webdev #security - AWS Shield, ReadOnly, and "not authorized to perform: shield:GetSubscriptionState" work-around
September 6, 2018 #aws #iam #security - AWS WAF vs AWS WAF Regional
September 5, 2018 #aws #waf #security - Cloud Custodian Code Confusion
September 4, 2018 #aws #devops #security - AWS WAF / AWS Shield for DDoS Protection
August 31, 2018 #aws #waf #security - Investigating Web Cache Poisoning
August 22, 2018 #http #caching #security - Making a secure connection to ElastiCache (Redis)
June 27, 2018 #aws #redis #security #networking - Selecting an ElastiCache (Redis) AUTH token
June 27, 2018 #aws #secretsmanager #redis #security - Redis Security Investigation
June 22, 2018 #aws #redis #security - Side-channel attacking browsers through CSS3 features
June 2, 2018 #webdev #css #security - Categorizing Backlog Items using the OWASP SAMM Security Practices
May 15, 2018 #security #owasp #agile - Content-Security-Policy HTTP Header Braindump
April 27, 2018 #http #webdev #javascript #security - Secrets Management
April 10, 2018 #security #podcast - Database Credential Rotation in PostgreSQL
April 9, 2018 #aws #secretsmanager #database #security - AWS Options for Blocking IP Addresses
March 20, 2018 #aws #security #networking - HTTP to HTTPS Redirection Investigation
March 13, 2018 #http #webdev #security - Adoption of HTTP Security Headers on the Web
March 6, 2018 #http #security - Marking HTTP Pages as "Not Secure"
February 9, 2018 #http #webdev #security - What defines a known open source vulnerability?
February 8, 2018 #opensource #security - Referrer-Policy HTTP header
February 7, 2018 #http #webdev #security - AWS Certificate Manager and Certificate Pinning
October 30, 2017 #aws #http #security - Using the Virtual MFA Device with the AWS CLI
October 22, 2017 #aws #cli #iam #mfa #security - HashiCorp Vault supports AWS STS AssumeRole and TOTP
October 21, 2017 #aws #iam #mfa #security - Creating and Using an AWS Virtual MFA Device with the AWS SDK for Python
October 21, 2017 #aws #sdk #python #iam #mfa #security - Customer Data Encryption-At-Rest Options
September 27, 2017 #aws #encryption #security - Out with HPKP, in with CAA?
August 30, 2017 #http #security - Could the Bitcoin "SegWit 2x" fork be the start of a "51% Attack"?
July 24, 2017 #random #security - Application Security Testing: SAST, DAST, and IAST
July 20, 2017 #security #codequality - Penetration Testing, Secure Code Review, and Secure Design Review (Threat Modeling)
July 20, 2017 #security #codequality - Finding Publicly Exposed Amazon S3 Buckets
July 19, 2017 #aws #devops #security #s3 - Capital One Cloud Custodian "Test Drive"
July 5, 2017 #aws #python #devops #security - Encrypted Properties and AWS IAM Roles
June 26, 2017 #aws #iam #encryption #database #security - Thou shalt not depend on me: analysing the use of outdated JavaScript libraries on the web
March 9, 2017 #javascript #security - Web Browser Secure Contexts
February 14, 2017 #webdev #security - "Hacked" by Baiduspider and YandexMetrika
January 13, 2017 #aws #xray #security #monitoring - HPKP and RansomPKP
September 6, 2016 #http #security #webdev - How IAM Roles Become Credentials on EC2
August 15, 2016 #aws #iam #security - Categorizing Information Security Topics
July 20, 2016 #security - Pokemon Go vs. Certificate Pinning
July 11, 2016 #http #security #pokemon - AWS WAF vs. ModSecurity
April 25, 2016 #aws #waf #webdev #security - Next Generation Session Management with Spring Session
December 21, 2015 #java #spring #security - IP Address as a factor?
April 7, 2015 #security #networking - JavaScript Static Code Analysis?
November 19, 2014 #javascript #security #codequality - CDN Hosting of JavaScript and Information Security Aspects
July 3, 2014 #javascript #security #webdev - cf.Objective() 2014
May 20, 2014 #javascript #encryption #security #conference