Magika: Enhancing File Content Type Detection through Deep Learning Enhancing file content type detection through deep learning with Magika, an open-source tool by Google.
Addressing Cloud Security Risks: Part 3 - Unauthorised Access A brief on addressing an important cloud security risk - unauthorised access.
Addressing Cloud Security Risks: Part 2 - Credential Theft/Leakage A brief on addressing an important cloud security risk - credential theft/leakage.
Addressing Cloud Security Risks: Part 1 - Misconfiguration A brief on addressing an important cloud security risk - misconfiguration.
Top 5 Cloud Security Risks for Startups A deep dive into the top five cloud security risks encountered by early stage startups.
The Muggles Guide to Cloud Security Risks and Best Practices The muggles guide to cloud security risks and best practices, a short compendium.
Test Your Secret Management Skills with OWASP WrongSecrets A brief on OWASP WrongSecrets, an intentionally vulnerable web app focused on secret management hygiene.
Expose Web Services on Your Home Network with Nginx Proxy Manager A step-by-step guide to exposing web services on your home network with Nginx Proxy Manager.
So, The Software Supply Chain is Broken. How Do We Fix It? This post describes a logical model to improve trust and transparency in software supply chain security.
Software Supply Chain Threats and Vulnerabilities A brief on the software supply chain, and its associated threats and vulnerabilities.