Remove Applications Remove Authentication Remove Linux Remove Transportation
article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

Recent vulnerabilities in the runc container engine, and the CVE-2018-1002105 tCP vulnerability in TCP (Transport Control Protocol) itself requires quick upgrades of the cluster modules themselves. RBAC (Role Based access Control) has become a standard for the Kubernetes Authentication-Authorization-Admission security paradigm.

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Operating Systems/Applications. This will become even more useful, in my opinion, when Linux support is added. Viktor van den Berg shares his CKAD exam experience and some tips on how to prepare.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 116

Scott Lowe

If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. 509v3 digital certificates, how they help enable asymmetric (public/private key) encryption, and the connection to Transport Layer Security (TLS). Operating Systems/Applications.

Storage 60
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. Calderon: Paulino Calderon, I'm a senior application security consultant with Websec.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. Calderon: Paulino Calderon, I'm a senior application security consultant with Websec.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

Log4j is used in many applications or is present, with dependencies in enterprise applications as well as numerous cloud services, all of which makes updating all the possible uses for it hard, even if coordinated in advance. When the task is to send data to several applications and avoid direct use of their API.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

And how many other serious vulnerabilities like Heartbleed are lurking unknown in the applications we use everyday, in the websites we depend on, and in the devices we carry. And traditional application security tools like static analysis, they couldn’t find it. I mean, it was open source, right? So what is Heartbleed?