DEV Community

Srinivas Kandukuri
Srinivas Kandukuri

Posted on

Checkout Last week top 5 posts tagged(#security)

Authentication vs Authorization: Exploring The Difference

The widespread accessibility of applications introduces a significant security challenge - the risk of unauthorized access to the valuable data and resources. Having robust application security in...

How does machine to machine authentication work?

Machine to machine auth is how you ensure secure communication between individual services, and each service can authorize others to access protected resources.

This article is part of the Authress...

Using IAM authentication for Redis on AWS

How to securely connect your Go applications to Amazon MemoryDB (or ElastiCache) for Redis using IAM

Amazon MemoryDB for Redis has supported username/password based authentication using Access...

Hardening Cluster Security in Google Kubernetes Engine

Introduction

This technical article is a detailed continuation of my talk at DevFest Ikorodu, where I spoke extensively about key security concepts in Kubernetes and how to build a truly secure...

Mastering File Upload Security: Understanding File Types

In today's digital landscape, file exchange has become an integral part of our online activities, from sharing work documents to uploading pictures on social media. However, this convenience comes...

Top comments (1)

Collapse
 
c4r4x35 profile image
Srinivas Kandukuri

Shoutout to all the awesome authors featured this week : @egeaytin , @wparad , @abhirockzz , @monarene , and @mareke 🙌.