Close

Bilgi Güvenliği

Bilgi güvenliği hakkında paylaşımlarım

Beyond the Walls: AWS GuardDuty’s Watchful Eye on Your Cloud.

Beyond the Walls: AWS GuardDuty's Watchful Eye on Your Cloud.

AWS GuardDuty is a cloud-based threat detection service that monitors your AWS accounts and workloads for malicious or unauthorized activity. You can use AWS GuardDuty to detect and respond to threats such as compromised instances, reconnaissance, port scanning, denial of service attacks, and more. AWS GuardDuty can also integrate with […]

Devamını Oku

Is AWS Chatbot the Next Big Thing in Business Communication or Just Another Botched Attempt?

What Is AWS Chatbot?

AWS Chatbot is a service provided by Amazon Web Services (AWS). It allows you to create and deploy chatbots in various messaging channels like Slack, Amazon Chime, and Microsoft Teams. With AWS Chatbot, you can configure chatbots to monitor and interact with your AWS resources, such as Amazon CloudWatch and […]

Devamını Oku

Reflections on Trusting Trust by Ken Thompson

Reflections on Trusting Trust by Ken Thompson

In his Turing Award lecture titled “Reflections on Trusting Trust,” Ken Thompson delves into the complexities and inherent vulnerabilities in trusting software. He begins by acknowledging his contributions to UNIX and his collaboration with Dennis Ritchie, emphasizing the collective effort behind the project. Thompson identifies himself primarily as a programmer […]

Devamını Oku

Security in DevOps and AWS with AWS IAM

Security in DevOps and AWS with AWS IAM

Keep your systems and data secure. DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). DevOps aims to shorten the systems development life cycle and provide continuous delivery with high quality. Security is an integral part of DevOps. By following security best practices, you […]

Devamını Oku

Open-Source Advantages: Navigating the Benefits and Challenges of authentik

Open-Source Advantages: Navigating the Benefits and Challenges of authentik

Open-source software like authentik has been gaining traction across industries due to its inherent flexibility, transparency, and collaboration. However, while numerous advantages exist, organizations must also be cognizant of potential challenges. Let’s delve into the benefits and challenges of authentik’s open-source nature, especially concerning customization, community support, and security. Benefits: […]

Devamını Oku

Navigating the Evolving Cybersecurity Landscape with Platforms like authentik

Navigating the Evolving Cybersecurity Landscape with Platforms like authentik

The threats and challenges are constantly evolving in the ever-changing realm of cybersecurity. As malevolent actors devise new methods to breach systems, the onus is on platforms like authentik to stay ahead of the curve and ensure their authentication mechanisms are robust and adaptable. Here’s a glimpse into how such […]

Devamını Oku

Streamlining Operations and Bolstering Security with authentik

Streamlining Operations and Bolstering Security with authentik

In today’s digital age, organizations grapple with many authentication systems, each catering to different applications and user groups. This fragmented approach not only complicates operations but also poses potential security risks. Consolidating all authentication needs into a single platform, as authentik proposes, offers several advantages: 1. Simplified Management: With a […]

Devamını Oku

Welcome to authentik

authentik

authentik is a unified platform designed to bring all authentication needs into one place. It aims to replace platforms like Active Directory, Okta, and Auth0. The platform offers a range of features: The platform also compares with other providers like Keycloak, Microsoft ADFS, Microsoft Azure AD, Okta, Duo, and Authelia, […]

Devamını Oku

RSA Key Generation, Signatures, and Encryption using OpenSSL

OpenSSL

Demonstration of using OpenSSL to create RSA public/private key pair, sign and encrypt messages using those keys, and then decrypt and verify the received messages. Commands used: OpenSSL. Created by Steven Gordon on 7 March 2012 at Sirindhorn International Institute of Technology, Thammasat University, Thailand. Using the RSA algorithm, RSA […]

Devamını Oku

Navigating the Evolving Landscape of Digital Security

Navigating the Evolving Landscape of Digital Security

As the digital realm expands, so does the frequency and sophistication of cyberattacks. Password breaches have become a concerning reality, prompting a reevaluation of password management strategies. Both companies and users must adapt to these challenges to safeguard their digital assets. Here’s a roadmap for the future of password management: […]

Devamını Oku