Harpreet Singh KalsiinI am a dummy, enlighten me!Understanding IAST and Its Impact on DevSecOpsInteractive Application Security Testing (IAST) is a modern approach to application security testing that combines the benefits of Static…Mar 24
Ranjan Singh CyberSecurityinCloud Native DailyBuilding a DevSecOps Pipeline with Open Source ToolsDevSecOps with Open source tools and code snippetMay 7, 20231
Harpreet Singh KalsiinI am a dummy, enlighten me!Understanding DAST and Its Impact on DevSecOpsDynamic Application Security Testing, commonly known as DAST, is a security process that tests a web application from the outside in by…Mar 23Mar 23
0xffccddCloud Security Automation: Definition, Best Practices and ToolsCloud Security Automation has become an increasingly important part of modern security strategies. It allows organizations to reduce the…Nov 30, 2022Nov 30, 2022
Truls TDinDetect FYIAutomating Security Monitoring — Part 2: AutomationLet's get straight to the point; security monitoring is the process of consuming data, analyzing it and detecting malicious activity, then…Mar 1Mar 1
Harpreet Singh KalsiinI am a dummy, enlighten me!Understanding IAST and Its Impact on DevSecOpsInteractive Application Security Testing (IAST) is a modern approach to application security testing that combines the benefits of Static…Mar 24
Ranjan Singh CyberSecurityinCloud Native DailyBuilding a DevSecOps Pipeline with Open Source ToolsDevSecOps with Open source tools and code snippetMay 7, 20231
Harpreet Singh KalsiinI am a dummy, enlighten me!Understanding DAST and Its Impact on DevSecOpsDynamic Application Security Testing, commonly known as DAST, is a security process that tests a web application from the outside in by…Mar 23
0xffccddCloud Security Automation: Definition, Best Practices and ToolsCloud Security Automation has become an increasingly important part of modern security strategies. It allows organizations to reduce the…Nov 30, 2022
Truls TDinDetect FYIAutomating Security Monitoring — Part 2: AutomationLet's get straight to the point; security monitoring is the process of consuming data, analyzing it and detecting malicious activity, then…Mar 1
Truls TDinDetect FYIAutomating Security Monitoring — Part 1: DataLately I've been presenting a few times on the topic of automation and in particular for security monitoring to combat alert fatigue…Mar 1
ArunklinTheSecMasterAutomating Threat Detection and Incident Response with SOARWith cyber threats becoming more advanced and targeted, security teams struggle to keep up. Manual and siloed security processes lead to…Jan 11
peterBlock an external IP address in pfSense automaticallypfSense is a popular open-source Firewall product. Upon detecting suspicious traffics, one of the common remediation to block IP address…Jun 1, 2022