kevinhakanson.com

50 posts tagged #security

  1. Veracode API HMAC Authentication in Python
    September 06, 2019 #security #codequality #python
  2. Using the JFrog Artifactory CLI with API Keys or Access Tokens
    August 21, 2019 #devops #cli #security
  3. Scanning for OWS SQL Injection Protection
    August 12, 2019 #security #codequality #devops #powershell
  4. AWS Signature Authorization using Postman
    July 07, 2019 #http #aws #security
  5. Programmatically Adding IP Restrictions to an Azure App Service
    June 14, 2019 #security #azure #powershell
  6. X-XSS-Protection is Dead, Long Live Content-Security-Policy
    October 11, 2018 #http #webdev #security
  7. AWS Shield, ReadOnly, and "not authorized to perform: shield:GetSubscriptionState" work-around
    September 06, 2018 #aws #iam #security
  8. AWS WAF vs AWS WAF Regional
    September 05, 2018 #aws #waf #security
  9. Cloud Custodian Code Confusion
    September 04, 2018 #aws #devops #security
  10. AWS WAF / AWS Shield for DDoS Protection
    August 31, 2018 #aws #waf #security
  11. Investigating Web Cache Poisoning
    August 22, 2018 #http #caching #security
  12. Making a secure connection to ElastiCache (Redis)
    June 27, 2018 #aws #redis #security #networking
  13. Selecting an ElastiCache (Redis) AUTH token
    June 27, 2018 #aws #secretsmanager #redis #security
  14. Redis Security Investigation
    June 22, 2018 #aws #redis #security
  15. Side-channel attacking browsers through CSS3 features
    June 02, 2018 #webdev #css #security
  16. Categorizing Backlog Items using the OWASP SAMM Security Practices
    May 15, 2018 #security #owasp #agile
  17. Content-Security-Policy HTTP Header Braindump
    April 27, 2018 #http #webdev #javascript #security
  18. Secrets Management
    April 10, 2018 #security #podcast
  19. Database Credential Rotation in PostgreSQL
    April 09, 2018 #aws #secretsmanager #database #security
  20. AWS Options for Blocking IP Addresses
    March 20, 2018 #aws #security #networking
  21. HTTP to HTTPS Redirection Investigation
    March 13, 2018 #http #webdev #security
  22. Adoption of HTTP Security Headers on the Web
    March 06, 2018 #http #security
  23. Marking HTTP Pages as "Not Secure"
    February 09, 2018 #http #webdev #security
  24. What defines a known open source vulnerability?
    February 08, 2018 #opensource #security
  25. Referrer-Policy HTTP header
    February 07, 2018 #http #webdev #security
  26. AWS Certificate Manager and Certificate Pinning
    October 30, 2017 #aws #http #security
  27. Using the Virtual MFA Device with the AWS CLI
    October 22, 2017 #aws #cli #iam #mfa #security
  28. HashiCorp Vault supports AWS STS AssumeRole and TOTP
    October 21, 2017 #aws #iam #mfa #security
  29. Creating and Using an AWS Virtual MFA Device with the AWS SDK for Python
    October 21, 2017 #aws #sdk #python #iam #mfa #security
  30. Customer Data Encryption-At-Rest Options
    September 27, 2017 #aws #encryption #security
  31. Out with HPKP, in with CAA?
    August 30, 2017 #http #security
  32. Could the Bitcoin "SegWit 2x" fork be the start of a "51% Attack"?
    July 24, 2017 #random #security
  33. Application Security Testing: SAST, DAST, and IAST
    July 20, 2017 #security #codequality
  34. Penetration Testing, Secure Code Review, and Secure Design Review (Threat Modeling)
    July 20, 2017 #security #codequality
  35. Finding Publicly Exposed Amazon S3 Buckets
    July 19, 2017 #aws #devops #security #s3
  36. Capital One Cloud Custodian "Test Drive"
    July 05, 2017 #aws #python #devops #security
  37. Encrypted Properties and AWS IAM Roles
    June 26, 2017 #aws #iam #encryption #database #security
  38. Thou shalt not depend on me: analysing the use of outdated JavaScript libraries on the web
    March 09, 2017 #javascript #security
  39. Web Browser Secure Contexts
    February 14, 2017 #webdev #security
  40. "Hacked" by Baiduspider and YandexMetrika
    January 13, 2017 #aws #xray #security #monitoring
  41. HPKP and RansomPKP
    September 06, 2016 #http #security #webdev
  42. How IAM Roles Become Credentials on EC2
    August 15, 2016 #aws #iam #security
  43. Categorizing Information Security Topics
    July 20, 2016 #security
  44. Pokemon Go vs. Certificate Pinning
    July 11, 2016 #http #security #pokemon
  45. AWS WAF vs. ModSecurity
    April 25, 2016 #aws #waf #webdev #security
  46. Next Generation Session Management with Spring Session
    December 21, 2015 #java #spring #security
  47. IP Address as a factor?
    April 07, 2015 #security #networking
  48. JavaScript Static Code Analysis?
    November 19, 2014 #javascript #security #codequality
  49. CDN Hosting of JavaScript and Information Security Aspects
    July 03, 2014 #javascript #security #webdev
  50. cf.Objective() 2014
    May 20, 2014 #javascript #encryption #security #conference