Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Find Out Hosting of Website?

The hosting provider is an important piece of a website's backend infrastructure. But if you come across a website, how can you find out which company or service hosts it? This article will outline several methods to identify the hosting provider behind any website, including the use of online tools, DNS record analysis, source code inspection, and contacting the website owner.

GitOps - Enhancing security and ensuring compliance in Kubernetes deployments

GitOps can be a powerful means of achieving continuous compliance in Kubernetes deployments. It provides transparency for any changes made to your infrastructure, along with the ability to trace and audit these changes. In this article, we will discuss how GitOps can enhance security and ensure compliance in Kubernetes deployments. We will also discuss potential security threats that GitOps could introduce into a Kubernetes infrastructure.

Handle secrets like API keys securely in javascript projects with environment variables

In this video we look at how to effectively use the dotenv npm package to securely use secrets like API keys by loading them into your project as environment variables. To do this we first place our secrets in a.env file and the dotenv project will load these in as env variables.

OS hardening 20 Best Practices

Operating system (OS) hardening, a facet of system hardening, involves the implementation of security measures of operating systems like Windows, Linux, or macOS (aka OS X) to bolster their defenses against cyberattacks. The primary aim is to fortify sensitive computing systems, thereby reducing their vulnerability to various security threats, including data breaches, unauthorized access, system intrusions, and malware in accordance with best security practices.