#security
Read more stories on Hashnode
Articles with this tag
Another great session at this weeks German OWASP Day was the closing keynote by Christina Lekati with the title "Social Engineering: What if the user...
I just got back home from the German #OWASP Day, and one of the great presentations was Björn Kimminich's session where he demonstrated some...
No matter if you build your workloads in the cloud or on-premises, there are a number of principles that can help you strengthen your workload...
Zero Trust is a security model and set of mechanisms that emphasizes identity verification, least privilege access, continuous monitoring, and...
SQL injection attacks are one of the most common and dangerous types of attacks on websites and apps. They occur when malicious users inject SQL code...
Amazon S3 is often used for critical data such as backups and business-critical files. Protecting these files from accidental or malicious overwriting...