Links
AddSecurity shouldn't wait until the end of development. Wazuh brings real-time threat detection, compliance, and vulnerability scanning into your DevOps pipeline—powering a stronger DevSecOps strategy from day one. Learn more about how Wazuh can help secure your development cycle.
Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves. The tokens allow you to implant traps around your network and notifies you as soon as they are triggered.
The Common Vulnerabilities and Exposures (CVE) Program has become the cornerstone of vulnerability management. Nearly all technology vendors and service providers identify vulnerabilities with CVEs when they publish security advisories. Most security products and services related to vulnerabilities
Support my projects on Patreon (please only if you have the means): https://patreon.com/posyA video about all forms of equalizers. From one-click bass button...
Visualise your CSV files in seconds without sending your data anywhere
Notes about technology, DevOps, programming, and database
In this article, you will find a list of open source cybersecurity tools that you'll wish you'd known earlier.
That's certainly one of the stranger headlines we've written
September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. December 2, 2019: Since the author wrote this post, AWS Single Sign On (AWS IAM Identity Center) has launched native features that simplify using […]
My secret combo for peak productivity
The homepage of the work for which I'm best known — a model Boeing 777, made entirely from manila folders!
like jq but for Markdown: find specific elements in a md doc - yshavit/mdq
Learn how packets flow inside and outside a Kubernetes cluster. Starting from the initial web request and down to the container hosting the application
Upgrade from a local MCP Docker image to GitHub’s hosted server and automate pull requests, continuous integration, and security triage in minutes.