The Ops Community ⚙️

# security

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Are You a Proxmox VE Data Defender? Take the Quiz and Find Out

Are You a Proxmox VE Data Defender? Take the Quiz and Find Out

Comments
2 min read
How to Back Up Proxmox Virtual Machines – A Complete Data Protection Guide

How to Back Up Proxmox Virtual Machines – A Complete Data Protection Guide

Comments
3 min read
Choosing the Best Data Protection Software for Business Continuity in 2025

Choosing the Best Data Protection Software for Business Continuity in 2025

Comments
6 min read
Navigating Brownfield Environments in AWS: Steps for Successful Cloud Use

Navigating Brownfield Environments in AWS: Steps for Successful Cloud Use

Comments 1
7 min read
Navigating AWS Anti-Patterns: Common Pitfalls and Strategies to Avoid Them

Navigating AWS Anti-Patterns: Common Pitfalls and Strategies to Avoid Them

1
Comments 3
8 min read
Enforcing guardrails in the AWS environment

Enforcing guardrails in the AWS environment

Comments
7 min read
Understanding and Mitigating the Latest OpenSSH Vulnerability (CVE-2024-6387) in AKS

Understanding and Mitigating the Latest OpenSSH Vulnerability (CVE-2024-6387) in AKS

1
Comments
9 min read
The 1 Azure Arc Setting You Can't Ignore: config.mode

The 1 Azure Arc Setting You Can't Ignore: config.mode

1
Comments
1 min read
AWS: Kubernetes and Access Management API, the new authentication in EKS

AWS: Kubernetes and Access Management API, the new authentication in EKS

2
Comments
11 min read
AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

Comments
12 min read
AWS: Karpenter and SSH for Kubernetes WorkerNodes

AWS: Karpenter and SSH for Kubernetes WorkerNodes

1
Comments
10 min read
Hacking Alibaba Cloud's Kubernetes Cluster

Hacking Alibaba Cloud's Kubernetes Cluster

5
Comments 2
14 min read
Announcements from AWS re:Inforce 2024 Keynote

Announcements from AWS re:Inforce 2024 Keynote

2
Comments
6 min read
How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

Comments
7 min read
Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

1
Comments
6 min read
Checklist for designing cloud-native applications – Part 2: Security aspects

Checklist for designing cloud-native applications – Part 2: Security aspects

1
Comments
8 min read
AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

1
Comments
5 min read
AWS Elastic Kubernetes Service: RBAC Authorization via AWS IAM and RBAC Groups

AWS Elastic Kubernetes Service: RBAC Authorization via AWS IAM and RBAC Groups

Comments
12 min read
Use IAM Roles Anywhere to reduce the use of IAM keys

Use IAM Roles Anywhere to reduce the use of IAM keys

2
Comments 3
31 min read
Security challenges with SaaS applications

Security challenges with SaaS applications

2
Comments 1
6 min read
VictoriaMetrics: VMAuth — Proxy, Authentication, and Authorization

VictoriaMetrics: VMAuth — Proxy, Authentication, and Authorization

1
Comments
7 min read
MSP Cybersecurity: What You Should Know

MSP Cybersecurity: What You Should Know

1
Comments
8 min read
Enterprise-scaled Self-Healing StackSets

Enterprise-scaled Self-Healing StackSets

2
Comments 1
7 min read
AWS re:Inforce 2023 keynote highlights

AWS re:Inforce 2023 keynote highlights

2
Comments 1
4 min read
Privacy by Design and Privacy by Default in the Cloud

Privacy by Design and Privacy by Default in the Cloud

1
Comments 1
7 min read
loading...