Безопасность • DZone Security • 20 апреля 2021 г. 18:05
Introduction From telegraphs to online video calls and from fax machines to emails, the communication means have evolved exceptionally. Now the world has shifted from wired networks to wireless transmission, the internet being the most significant mo...... читать далее
mobile secuirty nfc identification nfc smartphone nfc top 5 security issuesБезопасность • DZone Security • 16 апреля 2021 г. 23:22
Tuesday, April 13 marks Identity Management Day — a time to bring awareness to business leaders, IT decision-makers, and others about the importance of managing and securing digital identities. It’s a nice concept: businesses coming together to...... читать далее
security it cyber security identity management identity access management digital identityБезопасность • DZone Security • 16 апреля 2021 г. 16:42
Introduction Do you know that cloud service acquisition is evolving so swiftly that it has grown up to 35% in 2021? Nearly every business that you can possibly think of is utilizing public cloud computing services for most of their critical business...... читать далее
cloud cloud computing artifical intelligence cyber security cyber attack cyber crime security & defense security analysis cloud computing definitionБезопасность • DZone Security • 15 апреля 2021 г. 17:55
This week, we obviously have to discuss the hundreds of millions of Facebook and Clubhouse user profiles that were scraped using APIs. In other news, Forrester has published their fresh and insightful report “The State of Application Security”, and t...... читать далее
api facebook cybersecurity apis api security newsletter forresterБезопасность • DZone Security • 14 апреля 2021 г. 23:12
Introduction Software Security is important more than ever in today's world. If we embed the security in the development phase of the application it not only benefits the overall security adherence but also creates multiple security checkpoints at mu...... читать далее
java security tutorial best practices secure coding security and defenseБезопасность • DZone Security • 8 апреля 2021 г. 17:48
Introduction In this tech-oriented world where a number of hackers and technological advancements are emerging in parallel to each other, artificial intelligence has made big strides recently in understanding languages. Contrary to this, artificial i...... читать далее
cybersecurity cyber attacks ai algorithm ai algorithms ai and blockchainБезопасность • DZone Security • 8 апреля 2021 г. 17:28
This week, we check out the recent API vulnerabilities at VMware and GitLab, how URL parameters can lead to server-side request forgery (SSRF) vulnerabilities, and the upcoming webinar on some of the recent real-life API security flaws. Vulnerability...... читать далее
api apis api security newsletter cybersecuity ssrfБезопасность • DZone Security • 8 апреля 2021 г. 16:02
Introduction Is your company’s IT environment adequately secured? If your business relies heavily on the internet and technology, cybersecurity has to be a critical and significant part of operations. To ensure the cybersecurity measures you ado...... читать далее
cybersecurity security audit cybersecurity analysis security and defense it environment security assessmentБезопасность • DZone Security • 7 апреля 2021 г. 23:59
SSL certificates are very important for authenticating websites and ensuring connections are encrypted. However, there are some scenarios when they can create headaches. Rather than throw the baby out with the bathwater and abandon the use of SSL, yo...... читать далее
security ssl certificate sql (structured query language)Безопасность • DZone Security • 7 апреля 2021 г. 1:45
Last time, I talked about the perils of leaving secrets in open-sourced code and how to detect those secrets using regex and entropy analysis: https://blog.shiftleft.io/scanning-for-secrets-in-source-code-9fcb486f8c0e. Hardcoded secrets are an exampl...... читать далее
security software development data compliance information security sast scanning sensitive data data leakБезопасность • DZone Security • 6 апреля 2021 г. 14:27
Introduction Secrets are a form of distilled trust. They may be API keys, passwords, certificates, and other forms of key material. Generally, such credentials have a few major properties that make them more useful than just granting trust: They ca...... читать далее
security api keys tokens downtime key rotation security keysБезопасность • DZone Security • 5 апреля 2021 г. 8:30
How It Works It’s possible to attach an IAM role in a Kubernetes POD without using third-party software, such as kube2iam and kiam. This is thanks to the integration between AWS IAM and Kubernetes ServiceAccount, following the approach of IAM Role...... читать далее
cloud tutorial aws kubernetes cloud security k8s eks aws security kubernetes security aws iamБезопасность • DZone Security • 5 апреля 2021 г. 7:08
Multi-Factor Authentication (MFA) is a security mechanism wherein a user is granted access only after providing more than one method of authentication. An organization administrator can make it mandatory for all non-SSO users to use MFA, exempt some...... читать далее
tutorial authentication mule 4 anypoint platform cloudhubБезопасность • DZone Security • 1 апреля 2021 г. 0:42
Earlier this month, news broke that hackers breached Verkada, a major provider of surveillance cameras to a variety of facilities throughout the US, gaining access to 150,000 live feeds. Among those compromised were Tesla, jail cells, private homes,...... читать далее
security cyber attack data breach security by designБезопасность • DZone Security • 31 марта 2021 г. 23:49
With today's world of constant digitization, enterprises are continuously shifting their workload to the IaaS platform from the legacy infrastructure because of its speed and flexibility. Gartner expects IaaS to grow by nearly 13.4% to $50.4 billion...... читать далее
cloud security iaas cloud storage data storage slaБезопасность • DZone Security • 31 марта 2021 г. 6:45
Cybercriminals are following businesses as they are moving towards digital space. If you are still utilizing old traditional cybersecurity strategies, it’s time to level up. Cybercriminals are floating on cloud nine in this era where the whole world...... читать далее
cloud cybersecurity cyber attack technological advancements security attackБезопасность • DZone Security • 30 марта 2021 г. 12:16
It’s easy to see why more consumers are switching to digital payment methods: it’s more convenient, easier to track, and reduces contact. To keep up with consumer expectations, eCommerce websites must ensure their payment channels are secure and seam...... читать далее
software testing payment app gateway applicationБезопасность • DZone Security • 29 марта 2021 г. 17:16
Secure coding practices are proven to reduce the number of vulnerabilities introduced. However, not all developers are well versed in security. There is a lot of training material available but it often takes hours of reading to get a good understand...... читать далее
security secure coding security training shiftleftБезопасность • DZone Security • 28 марта 2021 г. 13:33
With increased Cybersecurity challenges, firms are constantly battling to bring down the Mean Time to Detect/Discover (MTTD) of security threats. This is critical for multiple aspects such as customer satisfaction, legal compliance, and creditability...... читать далее
security analytics kibana logstash cybersecuity threat intelligence siem elastic stackБезопасность • DZone Security • 25 марта 2021 г. 21:37
Have you been searching for a penetration testing tool that would best serve your security testing requirements for web applications and networks? Do you want to compare and analyze different penetration testing tools and decide on which one(s) would...... читать далее
security testing vulnerabilites penetration testing tools simulated security attacks