
Sign up to save your podcasts
Or
1. Kube-goat: A deliberately vulnerable Kubernetes cluster https://reconshell.com/kube-goat-a-deliberately-vulnerable-kubernetes-cluster/
To truly learn how to protect Kubernetes clusters, it’s helpful to exploit known bad security settings.
2. Microsoft says mandatory password changing is “ancient and obsolete” https://arstechnica.com/information-technology/2019/06/microsoft-says-mandatory-password-changing-is-ancient-and-obsolete/
Embrace password managers for your Enterprise and remove the motivation for creating short passwords.
3. How Performance Became the Nemesis of the Secure Python Code https://www.securityjourney.com/post/how-performance-became-the-nemesis-of-the-secure-python-code
With Python, simpler and readable code contains fewer bugs and vulnerabilities. Great advice for every language!
4. Secure your code review: 8 key questions to ask https://techbeacon.com/security/secure-your-code-review-8-key-questions-ask
Train your developers' eyes for security – security code review is crucial.
5. The Need for Continuous and Dynamic Threat Modeling https://blogs.cisco.com/security/the-need-for-continuous-and-dynamic-threat-modeling
Security is a journey that requires influencing and enabling teams to adopt and employ best practices and controls for their architectures.
1. Kube-goat: A deliberately vulnerable Kubernetes cluster https://reconshell.com/kube-goat-a-deliberately-vulnerable-kubernetes-cluster/
To truly learn how to protect Kubernetes clusters, it’s helpful to exploit known bad security settings.
2. Microsoft says mandatory password changing is “ancient and obsolete” https://arstechnica.com/information-technology/2019/06/microsoft-says-mandatory-password-changing-is-ancient-and-obsolete/
Embrace password managers for your Enterprise and remove the motivation for creating short passwords.
3. How Performance Became the Nemesis of the Secure Python Code https://www.securityjourney.com/post/how-performance-became-the-nemesis-of-the-secure-python-code
With Python, simpler and readable code contains fewer bugs and vulnerabilities. Great advice for every language!
4. Secure your code review: 8 key questions to ask https://techbeacon.com/security/secure-your-code-review-8-key-questions-ask
Train your developers' eyes for security – security code review is crucial.
5. The Need for Continuous and Dynamic Threat Modeling https://blogs.cisco.com/security/the-need-for-continuous-and-dynamic-threat-modeling
Security is a journey that requires influencing and enabling teams to adopt and employ best practices and controls for their architectures.