Learning by Auditing Kubernetes Manifests

Last year, I spoke at the National DevOps Conference that took place at the British Museum. I had already visited the museum before, but speaking there was a fantastic experience. Besides, we had the museum all for ourselves for a couple of hours. If you’ve ever visited the place, you know what I mean. Anyway, … Read more

A Complete Guide to Cloud Security Testing

Cloud security testing is an essential part of cloud computing. Cloud-based security testing can help organizations detect and prevent breaches, protect their data and improve their compliance posture. In this comprehensive guide, we will discuss what cloud security testing is, its important, benefits, features, components, how to perform security testing in the cloud, and more! … Read more

Lessons Learned in Cloud Security From Lapsus$

Over the past few days, new information about the Lapsus$ cybercrime group has surfaced and provided fresh insights into the actual practices of cyber security adversaries. While it’s not clear exactly who they are (it’s been reported that the mastermind behind this group could be a teenager!) or the extent of their accomplishments – cloud … Read more

Understanding OAuth 2.0 – DZone Security

In a traditional client-server authentication model, a resource owner shares their credentials with the client so that the client can access its resources when necessary. The client does that by passing the resource owner’s credentials to the resource server, and the resource server validates the same before providing access to the protected resource(s). Simple, right? … Read more

Top Salesforce Deployment Challenges and Tips

As Salesforce organizations strive to improve IT delivery, making it faster, more quality-focused, and secure, they continue to face deployment challenges. Increased customer demands and high velocity releases every now and then are creating bottlenecks for Salesforce enterprises. This is where you need to recognize the Salesforce deployment challenges your team is facing and finding … Read more

Secure Proxy for HIPAA-Compliant API Analytics

In HeathTech apps, it’s often the case that you’re dealing with private or health-related data. This requires compliance with regulations, such as HIPAA in the United States. These regulations force you to handle sensitive data in a well-defined manner, so only specific people can read it, and if they do, it should be logged for … Read more

Common Types Of Network Security Vulnerabilities

Cyber ​​attacks become more and more sophisticated every year and cause serious financial and reputational damage. The damage affects all means of communication and blocks an organization for an extended period. For example, two of the most significant encryption viruses are Petya and Wanna Cry. They caused millions of losses in different areas of business … Read more