A description of each security header, why it is important, and how to configure your website in a secure way.
Creating the right Kubernetes cluster and container environment is a must for security. Here's how to set up an environment properly.
Part 2 of this series on creating the right Kubernetes cluster and container environment discusses advanced steps for proper security.
Some useful tips from the community to get a NodeJS app ready secure for production deployments.
Table of the auditing checks performed by PacBot, Prowler, Security Monkey, CloudMapper, Trusted Advisor, and AWS Config Rules
Building Security Frameworks Into Your CI/CD Pipelines. Embedding security into the product.
he eko is held annually in the Autonomous City of Buenos Aires. In this event, attendees, guests, specialists and referrers on this field from all around the world, have the opportunity to get involved with the latest technological innovations, vulnerabilities and tools. CFP ends at 31. July
Did you write a great post? Built a useful too or have something else to share? Please share it with me andy@occamslabs.com or on Twitter @pxlpnk