Tag: Infosec
-
8 common pen testing mistakes and how to avoid them
Posted on December 10, 2019, Level beginner Resource Length short
Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them. An article by Michelle Drolet.
Tags cloud infosec miscellaneous cio agile
-
Top 5 SD-WAN takeaways for 2019
Posted on December 5, 2019, Level beginner Resource Length medium
An article by Tobias Mann about key things related to SD-WAN in 2019. SD-WAN reached an inflection point in 2019.
Tags cloud infosec devops software linux
-
Adding Auth0 to Ionic Angular app using Auth Connect
Posted on December 2, 2019, Level beginner Resource Length medium
Learn how to secure your Ionic app by adding user authentication with Auth0 and Ionic Auth Connect. A tutorial by Matt Netkow.
Tags web-development infosec nodejs android
-
Using SSH port forwarding on Fedora
Posted on October 26, 2019, Level intermediate Resource Length short
Posted by Paul W. Frields. The protocol behind ssh allows terminal input and output to flow through a secure channel. You can also use ssh to send and receive other data securely.
Tags linux software infosec
-
Firebase: What is atomicity & how to accurately increment/decrement values in cloud Firestore
Posted on October 22, 2019, Level intermediate Resource Length short
In computer science, ACID (Atomicity, Consistency, Isolation, Durability) is a set of properties of database transactions intended to guarantee validity even in the event of errors, connection issues, power failure, and etc. An article by Jeff Lewis about atomicity in Firebase.
Tags nosql infosec cloud app-development web-development
-
Explainer: What is a quantum computer?
Posted on October 12, 2019, Level beginner Resource Length medium
This is the first in a series of explainers on quantum technology. How it works, why it's so powerful, and where it's likely to be most useful first. By Martin Giles.
Tags miscellaneous infosec learning machine-learning
-
Why less is more is the secret to cloud-native computing
Posted on October 11, 2019, Level beginner Resource Length medium
Jason Bloomberg wrote this article about how it seems that the entire IT infrastructure landscape is advancing so quickly, it might as well be lava under our feet. It is imperative that we find some island, some core of stability, lest the shifting magma of innovation and disruption burn us to a crisp.
Tags cloud software-architecture miscellaneous infosec
-
Best practices for running Buildah in a container
Posted on October 3, 2019, Level intermediate Resource Length long
One of the cool things about separating the container runtimes into different tools is that you can start to combine them to help secure one other. An article by Daniel Walsh.
Tags containers web-development cloud software-architecture infosec
-
Build a Laravel 6 CRUD app with authentication
Posted on October 2, 2019, Level intermediate Resource Length medium
Learn how to build and secure a travel manager CRUD application with Laravel 6.0. Author will walk through every step of building the application and then add authentication using Auth0. By Holly Lloyd, R&D Content Engineer.
Tags php web-development programming infosec
-
Adventures in the TCP stack: Uncovering performance regressions in TCP SACKs vulnerability fixes
Posted on September 20, 2019, Level advanced Resource Length long
Interesting article about diving into debugging of TCP stack by Chris Stevens, MichaĆ Switakowski, Ivan Sadikov, Winglung Ngai and Evan Ye.
Tags miscellaneous how-to cloud infosec
-
Monkey patching TLS in Node.js to support self-signed certificates with custom root certificate authorities
Posted on September 10, 2019, Level intermediate Resource Length medium
David Barral wrote this detailed guide on updating TLS (Transport Layer Security) in Node.js and how to consume services that have been secured with self-signed certificates.
Tags nodejs infosec web-development app-development
-
Build a mobile phone authentication component with React and Firebase
Posted on August 15, 2019, Level advanced Resource Length long
Krissanawat Kaewsanmuang wrote this article in which he let you learn how to build a reusable phone authentication component with React and Firebase. This is 3rd part of series of article. In order to understand this tutorial properly, it is recommended to go through previous chapters of this tutorial series.
Tags apis programming web-development infosec