Tag: Infosec
-
How to build a serverless real-time credit card fraud detection solution
Posted on March 7, 2021, Level intermediate Resource Length medium
As businesses continue to shift toward online credit card payments, there is a rising need to have an effective fraud detection solution capable of real-time, actionable alerts. By Polong Lin and Pavan Kattamuri.
Tags serverless gcp infosec cloud
-
How to protect sensitive data for its entire lifecycle in AWS
Posted on February 28, 2021, Level intermediate Resource Length long
Many Amazon Web Services (AWS) customer workflows require ingesting sensitive and regulated data such as Payments Card Industry (PCI) data, personally identifiable information (PII), and protected health information (PHI). In this post, I'll show you a method designed to protect sensitive data for its entire lifecycle in AWS. By Raj Jain.
Tags infosec web-development cio app-development apis
-
Security logging in cloud environments - AWS
Posted on February 26, 2021, Level intermediate Resource Length long
If you had to architect a multi-account security logging strategy, where should you start? This blog, part of the "Continuous Visibility into Ephemeral Cloud Environments" series, will describe a design for a state of the art multi-account security-related logging platform in AWS. By Marco Lancini.
Tags cloud infosec monitoring aws
-
Authenticating Vuepress apps with Auth0
Posted on February 25, 2021, Level intermediate Resource Length short
Learn how to create your first VuePress site and add Authentication with Auth0. By Fikayo Adepoju.
Tags web-development frontend nodejs javascript app-development infosec
-
Realizing the full potential of DevSecOps
Posted on February 10, 2021, Level beginner Resource Length medium
An article about four strategies to achieve a true DevSecOps culture. For federal agencies, achieving mission success increasingly hinges on modernizing legacy systems and transforming operations. By Phoebe Nerdahl @Atlassian.com.
Tags devops management cio cloud infosec app-development
-
CSO's ultimate guide to security and privacy laws, regulations, and compliance
Posted on February 8, 2021, Level beginner Resource Length long
This handy directory provides summaries and links to the full text of each security or privacy law and regulation. By csoonline.com.
Tags cio miscellaneous infosec teams cloud
-
Can you trust Zero Trust?
Posted on January 22, 2021, Level beginner Resource Length short
The days of implicitly trusting connected devices that are behind the traditional enterprise firewalled network with its "hard" perimeter are no longer. By Jason Soroko.
Tags devops infosec teams cio management
-
Firestore and authentication
Posted on January 11, 2021, Level beginner Resource Length medium
Firebase authentication makes it easy to add user identities to your app. When combined with Firestore, it can help to secure user data. By Steve Marx.
Tags nosql software infosec database
-
Docker for Java developers: 5 things you need to know not to fail your security
Posted on January 6, 2021, Level beginner Resource Length short
In this article we will focus on the Docker container security aspects related to building a Docker image, reducing the security vulnerabilities count introduced by Docker base images as well as Dockerfile security best practices. By Liran Tal and Omer Levi Hevroni.
Tags infosec containers docker java miscellaneous
-
How to SSH into a Docker container
Posted on January 4, 2021, Level intermediate Resource Length medium
How do you use SSH to enter a Docker container? The traditional approach consists of two step. By Debdut Chakraborty.
Tags containers docker devops infosec how-to
-
Serverless decision service
Posted on December 18, 2020, Level beginner Resource Length medium
Serverless is definitely a trend that enables organisations to just manage what matters to them rather than the whole infrastructure to run their business. Serverless Decision Service seems to be an answer to business agility that drives the business performance as it will take the worry and efforts of how to run operational decisions away from organisations. By Arash Aghlara.
Tags microservices serverless infosec event-driven
-
Handling webhooks with EventBridge, SAM and SAR
Posted on December 17, 2020, Level intermediate Resource Length medium
Applications author worked on in the last decade were rarely isolated from the rest of the world. Most of the time, they had many interactions with other applications out there. From time to time, some of these integrations are using WebSockets, which makes our integration realtime. By Slobodan Stojanović.
Tags microservices apis serverless infosec event-driven messaging aws