The Ops Community ⚙️

# security

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Apple's 47-Day SSL Certificate Plan is Your Next On-Call Nightmare

Apple's 47-Day SSL Certificate Plan is Your Next On-Call Nightmare

2
Comments
5 min read
Securing Agentic AI Systems

Securing Agentic AI Systems

Comments 1
15 min read
Why Every DevOps Team Has a Certificate Horror Story

Why Every DevOps Team Has a Certificate Horror Story

3
Comments 6
4 min read
Securing MCP Servers

Securing MCP Servers

Comments 3
11 min read
Bridging the Gap Between Security and Innovation

Bridging the Gap Between Security and Innovation

Comments 3
7 min read
AWS re:Inforce 2025 keynote highlights

AWS re:Inforce 2025 keynote highlights

Comments 1
9 min read
WebApp Security Checklist for Businesses in the USA | Protect Your Data

WebApp Security Checklist for Businesses in the USA | Protect Your Data

1
Comments 3
3 min read
Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Microsoft Defender for Storage: Threat Detection & Protection for Your Data

5
Comments 6
3 min read
How to Back Up Proxmox Virtual Machines – A Complete Data Protection Guide

How to Back Up Proxmox Virtual Machines – A Complete Data Protection Guide

Comments 1
3 min read
Navigating Brownfield Environments in AWS: Steps for Successful Cloud Use

Navigating Brownfield Environments in AWS: Steps for Successful Cloud Use

Comments 9
7 min read
Are You a Proxmox VE Data Defender? Take the Quiz and Find Out

Are You a Proxmox VE Data Defender? Take the Quiz and Find Out

Comments 1
2 min read
Choosing the Best Data Protection Software for Business Continuity in 2025

Choosing the Best Data Protection Software for Business Continuity in 2025

Comments 3
6 min read
Navigating AWS Anti-Patterns: Common Pitfalls and Strategies to Avoid Them

Navigating AWS Anti-Patterns: Common Pitfalls and Strategies to Avoid Them

1
Comments 5
8 min read
Enforcing guardrails in the AWS environment

Enforcing guardrails in the AWS environment

Comments 2
7 min read
Understanding and Mitigating the Latest OpenSSH Vulnerability (CVE-2024-6387) in AKS

Understanding and Mitigating the Latest OpenSSH Vulnerability (CVE-2024-6387) in AKS

1
Comments 1
9 min read
The 1 Azure Arc Setting You Can't Ignore: config.mode

The 1 Azure Arc Setting You Can't Ignore: config.mode

1
Comments
1 min read
AWS: Kubernetes and Access Management API, the new authentication in EKS

AWS: Kubernetes and Access Management API, the new authentication in EKS

2
Comments
11 min read
AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

Comments 4
12 min read
AWS: Karpenter and SSH for Kubernetes WorkerNodes

AWS: Karpenter and SSH for Kubernetes WorkerNodes

1
Comments
10 min read
Hacking Alibaba Cloud's Kubernetes Cluster

Hacking Alibaba Cloud's Kubernetes Cluster

5
Comments 2
14 min read
Announcements from AWS re:Inforce 2024 Keynote

Announcements from AWS re:Inforce 2024 Keynote

2
Comments 1
6 min read
How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

Comments
7 min read
Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

1
Comments
6 min read
Checklist for designing cloud-native applications – Part 2: Security aspects

Checklist for designing cloud-native applications – Part 2: Security aspects

1
Comments
8 min read
AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

1
Comments
5 min read
loading...