How to Create an AWS Lambda Function
In this guide, I’ll explain how AWS Lambda lets you… Continue reading How to Create an AWS Lambda Function
Collaborate Disseminate
In this guide, I’ll explain how AWS Lambda lets you… Continue reading How to Create an AWS Lambda Function
We have a micro-services architecture, where many microservers need to talk to each other for data.
These services are inside a VPC.
I need to understand if the HTTP APIs of these microservices need not have any authentication if they are … Continue reading Can the services inside the VPC be authentication less?
There is a “great cyber security awakening” happening across companies. Right now, we need a fundamental new approach to development, so we are not constantly firefighting. Almost two years into the pandemic, organizations are recognizing that their te… Continue reading Cultivating a security-first mindset for software developers
The title may be a bit misleading so I will try to make this as clear as possible. We have several microservices that
expose endpoints and they communicate to each other. They needed to authenticate each other so we used mTLS (Two way TLS)… Continue reading Authenticating/ identifying dynamic UI Client to Back-End [duplicate]
O’Reilly announced the findings of a survey report which explores the latest trends in cloud, microservices, distributed application development, and other critical infrastructure and operations technologies. Similar to last year’s results, cloud adopt… Continue reading Cloud adoption growing steadily, but cost and regulatory challenges remain
In this interview with Help Net Security, Daniel Clayton, VP Global Security Services and Support at Bitdefender, talks about the cybersecurity skills shortage gap and the role of automation in improving the work of cybersecurity professionals. It is c… Continue reading Automation is not here to close the cybersecurity skills shortage gap, but it can help
APIs are the grease turning the gears and wheels for many organizations’ IT systems today, but as APIs grow in number and use, tracking how they work (or don’t work) together can become complex and potentially critical if something goes awry. Now, a startup that has built an innovative way to help with this is […] Continue reading Tyk raises $35M for its open-source, open-ended approach to enterprise API management
At times, Kubernetes can feel like a superpower, but with all of the benefits of scalability and agility comes immense complexity. The truth is, few developers understand how Kubernetes works. Continue reading VCs are betting big on Kubernetes: Here are 5 reasons why
A study by Fastly and ESG, based on insights from information security and IT professionals representing hundreds of organizations globally, revealed growing concerns around adequately securing the rapidly rising number of mission-critical cloud servic… Continue reading Application security tools ineffective against new and growing threats
If your microservice architecture responds with error codes revealing which microservice had an error, doesn’t this reveal to the caller information on how your microservice architecture is designed?
Caller -> Service A -> Service B … Continue reading Error code prefixes specific to specific micro services a vulnerability?