Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role passing. We look at ways to avoid and detect IAM security holes.
The Domain Name System is repeatedly the target of or is leveraged for attacks on corporate infrastructures; however, it also lets you protect corporate networks against attacks and malware. The Blocky DNS server sets up quickly to secure DNS queries and DNS filtering for corporate networks.
A Helm chart is a template of several parts that defines, deploys, and upgrades Kubernetes apps and can be considered the standard package manager in the Kubernetes world.
Wireshark and a combination of tools comprehensively analyze your security architecture.
The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure.
macOS on-board tools and third-party applications can help prevent the loss of files and make security and backup your first priority.
Nitrokey hardware authentication devices aim to raise data encryption, key management, and user authentication security to the next level.
DMARC combines the abilities of SPF and DKIM to safeguard and protect against spam and phishing and allows targeted configuration according to company policy.
Systemd comes with a metric for determining the security of your system, letting you track how any service can be secured step-by-step in a sandbox.
Systemd comes with two functions for container management that allow many programs to run more securely through isolation.