Published inSystem WeaknessOWASP-K8S Security: Supply Chain VulnerabilitiesIn a previous blog, we talked about insecure workload configurations and explained in detail the dangers of privileged containers. In this…Aug 25, 2023Aug 25, 2023
Published inCloud Native DailyDockerized Mod Security WAFConfiguring the ModSecurity Nginx server as a reverse proxy alongside owasp-modsecurity rule sets.Aug 8, 20231Aug 8, 20231
Published inSystem WeaknessOWASP-K8S Security: Insecure Workload ConfigurationsIntroduction to KubernetesOct 17, 2022Oct 17, 2022