Category: Uncategorized

  • Goto

  • OSS Security Tool Highlight: Sigstore Cosign

    Sigstore Cosign is an open-source tool for securely storing and sharing cryptographic signatures. It is designed to help organizations and individuals verify the authenticity and integrity of digital documents and other types of files, using cryptographic signatures and public key infrastructure (PKI). https://github.com/sigstore/cosign Cryptographic signatures are a way of using cryptography to verify the authenticity […]

  • Security Architecture Katas

    Software security architecture katas are a set of exercises or challenges that help developers and security professionals build and maintain secure software systems. These katas can be used to improve knowledge and skills in key areas such as secure design and development, risk management, and threat modeling. One of the key benefits of software security […]

  • Speaker Media Resources

  • How to create a Security Chaos Engineering Experiment in Python

    Security chaos engineering is the practice of intentionally introducing security incidents into a system in order to test and improve its resilience and response to unexpected events. This can help organizations to identify and fix vulnerabilities before they are exploited by attackers. Creating a security chaos engineering experiment in Python involves the following steps: It […]

  • AWS SCE Example Experiment: Elastic Kubernetes Service (EKS) Worker Node

    Here is an example security chaos experiment in Python for Amazon Web Services (AWS) Elastic Kubernetes Service (EKS). This experiment simulates a scenario where an EKS worker node becomes unavailable, causing pods running on the node to be terminated. To run this experiment, you will need to have an AWS account and the AWS SDK […]

  • AWS SCE Example Experiment: IAM User Access Keys

    Here is an example security chaos experiment in Python for Amazon Web Services (AWS) Identity and Access Management (IAM). This experiment simulates a scenario where an IAM user’s access keys are accidentally deleted, causing the user to lose access to their AWS resources. To run this experiment, you will need to have an AWS account […]

  • AWS SCE Example Experiment: Security Group Rule Deletion

    Here is an example security chaos experiment in Python for Amazon Web Services (AWS). This experiment simulates a scenario where a security group rule is accidentally deleted, causing traffic to be blocked to an Amazon Elastic Compute Cloud (EC2) instance. To run this experiment, you will need to have an AWS account and the AWS […]

  • CyberBiz NameGen

    https://misadventuresincyberland.com/cyberbizname.html

  • What is Security Chaos Engineering

    Security chaos engineering is a subfield of chaos engineering that specifically focuses on testing and improving the security of a system. It involves deliberately introducing security-related failures or disruptions into a system in order to test its resilience and ability to recover from those failures or disruptions. Like traditional chaos engineering, security chaos engineering involves […]