AI Security — 3 policy you might consider to apply for your AI Security PostureIn 2024, AI will continue to advance and expand globally. As security engineers, we need to start planning the policies that will be…Nov 8Nov 8
Jenkins — CI/CD Tools: Post installation preparing to build a pipelineIn the previous section, we utilized Docker to set up the Jenkins installation in One-Click Setup and Docker Installation Guide. Now, we…Oct 18Oct 18
Jenkins — CI/CD Tools : Certified Jenkins Engineer (CJE) Preparation OverviewAt the time of 2024, it is a good time to learn more about the CI/CD tools. And most of peoples must be thinking a way how to learn the…Oct 4Oct 4
Jenkins — CI/CD Tools: One-Click Implementation and Guidelines with Docker InstallationWhen building CI/CD tools with Jenkins in Docker, it’s important to consider several key points. Leveraging Docker for CI/CD tools offers…Sep 20Sep 20
Penetration Testing : Password Cracking Part2 — Generate wordlistCustom password lost also could be one of technique to put related word into the wordlist to generate more related password to the targeted…Aug 16Aug 16
Cyber Security Defend — Windows System MonitorTools play an important role in protecting systems. System Monitor, also known as Sysmon, provides various event logs to SIEM, offering…Aug 2Aug 2
Development security — SAST VS DAST VS IASTAbout Development security, we could always more hearing about the SAST VS DAST. So what is the differences and how they are position in…Mar 21Mar 21
Penetration Testing: Password Cracking Tools and Use CasesDisclaimer: This blog is intended solely for educational purposes and is aimed at individuals interested in penetration testing. It is…Dec 13, 2023Dec 13, 2023
Jenkins — CI/CD pipeline with SnykLet’s us talk about the CI/CD tools — Jenkins. Jenkins is one of most famous tool for devloper to continue their work, and test and build…Nov 16, 2023Nov 16, 2023
AWS — VPC Peering Connect VPCsThe is about the explain the connection for VPCs and how they access to the internet for individual route table. The network architecture…Nov 12, 2023Nov 12, 2023