Guilherme SesterheimInstalling SonarQube with AnsibleTL;DR: code example to build your own SonarQube server with TLS activated to proactively scan your code for quality, test coverage and…Jun 6, 2021Jun 6, 2021
Afdul RohmatImplementation of JWT in Spring Boot 3 using Spring SecurityMaster Spring Security with step-by-step guide to building a secure API using JWT authentication and role-based access control.Jan 9Jan 9
the_unlucky_guySecuring Codes Using SonarQubeHola Hola, I hope you guys are taking good care of yourself. This blog will be different than my usual bug bounty write-ups. In this blog…6d ago6d ago
InOSINT TeambyCybersec with HemmarsMy Virtual HomeLab: Firewall and GatewayNetwork Segmentation, Configuring VLANs and pfSense Installation and SetupFeb 28Feb 28
Christina LekatiFrom Sock Puppets to Puppet MastersCreating honeypot sock puppet accountsFeb 13, 2021Feb 13, 2021
Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…Mar 6, 20243Mar 6, 20243
InGoogle Cloud - CommunitybyMathieu BenoitPlatform Engineering in action: Deploy the Online Boutique sample apps with Score and HumanitecLately, with KubeCon Paris 2024 and Google Cloud Next 2024, I have been preparing and delivering quite a good amount of demos about Score…Apr 22, 20241Apr 22, 20241
Ramesh NampellyPlatform Engineering at Palo Alto Networks: Part-2This is the second and last part of Platform Engineering at Palo Alto Networks blog post.In the previous post, we talked about Palo Alto…Jan 3, 2023Jan 3, 2023
Ramesh NampellyPlatform Engineering at Palo Alto Networks : Part-1I have been contemplating on what should be my first blog at Palo Alto Networks and when would be the right time to publish one. I felt…Dec 27, 2022Dec 27, 2022
Ramesh NampellyUnlocking Platform Engineering Success with North Star Metrics and OKRsBackgroundOct 5, 2024Oct 5, 2024
InLyft EngineeringbyAlex ChantavyVulnerability Management at Lyft: Enforcing the Cascade [Part 1]Nov 17, 20227Nov 17, 20227
Z3pH7How to Install and Uninstall OpenVAS completely — Kali linuxOpenVAS, an application used to scan endpoints and web applications to identify and detect vulnerabilities. It is commonly used by…Sep 18, 2024Sep 18, 2024
InDevOps.devbyGudisa GebiALL YOU NEED TO KNOW ABOUT KUBERNETES NAMESPACEA namespace in Kubernetes is a logical division within a cluster that helps organize and isolate resources for different applications…Mar 3Mar 3
InDev GeniusbyKostiantyn IllienkoDependency-Track: First Steps into SBOM Analysis and Vulnerability ManagementIn today’s complex software landscape, understanding and managing software dependencies is critical to ensuring the security and…Oct 13, 2024Oct 13, 2024
InDataDrivenInvestorbyAleksei AleinikovGitOps & Argo CD in 2025: Simplifying Kubernetes Deployments with AutomationRight now, we have GitLab in place but haven’t fully embraced GitOps. In other words, while Git helps us track code versions, we don’t yet…Feb 271Feb 271
InNEW IT EngineeringbyGosha KhromovGoodbye, Manual RBAC Management in Argo CDManaging Argo CD’s RBAC with K8s Controller and CRDsMar 33Mar 33
Zudonu Osomudeya100 Essential Commands, Scripts, and Hacks : The DevOps Engineer’s Survival Guide100 Essential Commands, Scripts, and HacksMar 32Mar 32
InPython in Plain EnglishbyKatoria HenryDocker Multi-Stage FastAPI TutorialDocker has revolutionized the way developers build, ship, and run applications, making containerization a core part of modern DevOps…Feb 25Feb 25
Abheepsa PattnaikHow to manage Vulnerabilities in Software Development lifecycle?Before we dive into how to tackle and manage vulnerabilities, lets understand what is vulnerability.Feb 28Feb 28