|
🔗 Stories, Tutorials & Articles |
|
|
|
Understanding the importance of data retention |
|
|
This blog will help you understand the importance of data retention, as well as how long personal data should be stored and the consequences of holding onto data for longer than necessary. |
|
|
|
|
|
|
Getting Started with a Zero-Trust Security Network Model |
|
|
In an increasingly perilous world, zero trust for network user verification is more than just a good idea–it's essential. |
|
|
|
|
|
|
AWS RDS Vulnerability Leads to AWS Internal Service Credentials |
|
|
Lightspin obtains credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension. |
|
|
|
|
|
|
A FinTech Roadmap to Data Security and Compliance with VGS and AWS |
|
|
In this post, you will see how easy it is to secure your VGS Inbound and Outbound Connections using the VGS software-as-a-service (SaaS) solution, which enables you to collect, protect, and exchange any type of sensitive information. |
|
|
|
|
|
|
Sigma rules explained: When and how to use them to log events |
|
|
Sigma rules allow you to detect anomalies in log events and identify suspicious activity. |
|
|
|
|
|
|
What are Man-in-the-Middle attacks and How to Prevent them? |
|
|
MITM attacks allow perpetrators to eavesdrop on the communication between a user and an application while making it look as though the communication is proceeding as it should. |
|
|
|
|
|
|
Exposed Kubernetes clusters |
|
|
Cyble analyzes the instances of misconfigured Kubernetes clusters and how they could potentially be exploited by Threat Actors. |
|
|
|
|
|
|
Validate Your YAML (with CUE) |
|
|
Cuelang is an extension of YAML and a command-line tool to validate your YAMl file . It is a static type system for configuration . It can be used to detect problems before they happens. |
|
|
|
|