Leila AlvesFortalecendo a Segurança na Nuvem: Arquitetura Zero Trust e SASEMulti Cloud GCP e AWSApr 5Apr 5
Leila AlvesEstrutura de EC2 Auto Scaling na AWSRefletindo sobre uma arquitetura de instâncias EC2 na AWS, considerando melhores práticas do Well Architect Framework, desenhei esse…Jan 291Jan 291
Leila AlvesWhat is User Enumeration?User enumeration is a vulnerability that allows an attacker to determine whether a user exists in a particular application. It is commonly…Oct 11, 2023Oct 11, 2023
Leila AlvesSQL injection: How It WorksSQL injection is a type of web attack that allows attackers to inject malicious SQL code into an application’s database queries. This can…Oct 10, 2023Oct 10, 2023
Leila AlvesThe top 5 security attacks you need to know aboutIn the digital age, security is a top priority for businesses and individuals alike. With the increasing sophistication of cyber attacks…Oct 10, 2023Oct 10, 2023
Leila AlvesLabels and tags in Google CloudGoogle Cloud context the terms “labels” and “tags” are used in different ways and refer to distinct concepts. Here is a breakdown of the…Oct 9, 2023Oct 9, 2023
Leila AlvesHSTS é tipo um segurança que garante que os sites sejam sempre acessados em HTTPS, que é uma versão…Interação entre o navegador e o servidor em relação ao HSTS:Jun 28, 2023Jun 28, 2023
Leila AlvesGoogle Cloud IAM vs. AWS IAMApesar de existir algumas diferenças de terminologia e implementação entre a AWS e o Google Cloud, existem conceitos similares aos quais…Jun 20, 2023Jun 20, 2023
Leila AlvesGoogle Cloud Fundamentals: Core InfraestructureNeste artigo, vou mostrar um resumo do que aprendi no curso “Fundamentos de Core Infraestrutura do Google Cloud”.Jun 14, 2023Jun 14, 2023
Leila AlvesComparing both Big Cloud plataforms in 2023 !AWS Cloud and GCP (Google Cloud Platform) are two of the big cloud computing platforms available today. They offer cloud infrastructure…Apr 1, 2023Apr 1, 2023