Tag: security
Explore the hidden complexities of PaaS services and learn practical strategies to manage them effectively, ensuring simplicity, speed, and efficiency in cloud computing.
Introduction AWS Secrets Manager was released in 2018. It is a nice replacement for secret strings in the SSM Parameter Store. With Secrets Manager it is possible to automate …
End of day two. So many topics already were presented, demonstrated, discussed, tried out to and by me. This article is just a very brief overview of what caught …
Introduction It is possible in AWS to check if your environment is compliant to your minimum standards. It is also possible to automatically change the environment to make it …
In this blog post, I will show how you can install the OWASP training tools WebGoat, WebWolf and JuiceShop on your local laptop using Vagrant.
Quality is something which is hard to define. Different areas of expertise use their own definitions of what quality is. Without an objective standard which carries weight, anyone can …
Introduction I think that every production environment in Azure uses Automation Accounts for f.e. scheduled tasks. Up to recently, you were forced to use the Run As user to …
Jenkins is a solid CI/CD platform which has proven itself over the years. Many organizations use it to build, test and deploy their applications. In Jenkins it is possible …
It is often expected of a DevOps team to also take security into consideration when delivering software. Often however, this does not get the attention it deserves. In this …
Alleen al dit jaar zijn er meer dan 70 'adviezen' geformuleerd door het Nationaal Cyber Security Centrum. Ondanks deze adviezen lezen we met enige regelmaat over grote IT-hacks en …
Applications nowadays, are usually deployed inside containers. A container consists of libraries and tools which allow the application to run inside. Since there can be exploitable vulnerabilities, it is …
In a previous blog I have explained which what cipher suites are, the role they play in establishing SSL connections and have provided some suggestions on how you can …
How it works in a simple view Several implementations are done with 2 way ssl certificates, but still wondering how it works? Let’s try to explain. Two-way ssl means …
Transport layer security (TLS) is not an easy topic. Many blogs have been written about this already. Surprisingly though, I did not find a single blog which was more …
As an integration/backend developer, when starting a project using Mobile Cloud Service, it is important to have some understanding of what this MBaaS (Mobile Backend as a Service) has …
The Oracle PaaS Cloud has matured over the last year from little more than premature product offerings and somewhat incoherent grand visions, to real products and a quickly emerging …
APIs are hot. Public APIs are an enterprise’s programmatic interface to B2B partners, governments and other stakeholders including app and web builders. Internally, APIs are the touch points for …
The IT evolution discussed in my previous article, also resulted in the concept of the cloud. Hard to define exactly, there is general understand that the cloud refers to …
Of course we take all reasonable measures to ensure only people we know gain access to our systems and our data (confidentiality through authentication) and that they do so …
Clearly, identity and access management is crucial. For on premises enterprise applications, with mobile apps and no less with cloud based applications. Identity and Access Management revolves around a …
This article gives an overview of some of the most eye catching stories from Oracle OpenWorld 2015 around Data Management. It discusses on premises products such as Oracle Database …
With the rise of cloud applications, a new way of looking at security is required. Security is no longer concentrated only within the perimeter of your company. The scope …
Looking at breaches in information systems and Cyber Crime the focus of the perpetrators is always aimed at our data. The goal is to copy, modify or even destroy the core …
This week I was doing research for one of our internal knowledge session when I stumbled across an interesting piece of history. I was tracing the history of computer …
or Some Musings on the Security Implications of Oracle Database Initialization Parameters Still following the steps of a database installation, this article will muse about some Initialization Parameters with …
In this blog I will illustrate how you can configure Weblogic Server to use OpenLDAP as authentication provider and to allow OpenLDAP users to login to the Oracle BPM …
or A closer look on database hosts The last couple of years quite a few organizations had a difficult time and internal costs where a main focal point was …