24 articles
TLS, mTLS, VPN, WireGuard. Protecting data in transit.
A complete guide to Nmap. Port scanning, service detection, scripting engine.
Linkerd architektura, zero-config mTLS, traffic split a observabilita.
Systematic approach to diagnosing network problems.
Setting up Let's Encrypt with certbot. Automatic renewal, wildcard certificates.
Nginx as web server, reverse proxy, load balancer. Complete configuration.
Sidecar proxy, traffic management, observability, and security.
Istio on Kubernetes — traffic management, mTLS, observability.
Microsegmentation in zero trust architecture. Service mesh identity, mTLS, SPIFFE/SPIRE and policy-based access...
SSL/TLS checklist — certificates, protocols, HSTS, certificate transparency.
Authorization Code, PKCE, Client Credentials. When to use which.
Zero Trust principles, identity-based access, micro-segmentation and BeyondCorp.
How CSRF attacks work and how to defend against them. Token, SameSite cookies, Double Submit.
Proper TLS 1.3 configuration, cipher suites, certificates.
CSP header for XSS protection. Directives, nonce, reporting.
Zero trust principles, implementation, micro-segmentation, identity-based access.
Multiplexing in HTTP/2, QUIC in HTTP/3, and how to deploy.
ModSecurity, AWS WAF, Cloudflare WAF. Rules and false positives.
Complete security audit checklist for web applications and infrastructure.
Semgrep, SonarQube, CodeQL. How to find vulnerabilities in code without running it.
Procedure for security incidents. Preparation, detection, containment, recovery.
DNS, proxy, SSL, Page Rules, and DDoS protection.
Mutual TLS authentication, certificates, and deployment.
What is mutual TLS, when to use it and how to configure it.