CloudInsidr

Cyber security, infotech

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home Home
Google I/O 2016 conference planned for May 18, registration kicks off on March 8

Cloud Insidr 2016-03-01 Leave a Comment

Google I/O 2016 conference planned for May 18, registration kicks off on March 8

Sundar Pichai, Google’s CEO, took to Google+ today to announce that the company’s annual developer conference, Google I/O 2016, would take place at the Shoreline Amphitheatre in Mountain View on May 18-20. If you plan to attend, mark your calendars now! The registration kicks off on March 8th.

This Google I/O is going to be huge. Sundar Pichai will celebrate its 10th anniversary with an exciting keynote and countless surprises. Stay tuned!

Filed Under: events, news Tagged With: Google I/O, Sundar Pichai

DROWN, a New Attack on OpenSSL: Millions of OpenSSL-Secured Websites Are at Risk!

Filipe Martins 2016-03-01 Leave a Comment

DROWN, a New Attack on OpenSSL: Millions of OpenSSL-Secured Websites Are at Risk!

A recently discovered security vulnerability in OpenSSL allows a long-deprecated protocol, SSL v2 (Secure Sockets Layer) to be misused in attacks at modern websites. The new attack has been, perhaps fittingly, dubbed DROWN, an acronym for Decrypting RSA with Obsolete and Weakened eNcryption. Cyber security analysts believe it might shut down–or shall we say drown, more than one third of all HTTPS servers. Is yours one of them?

[Read more…]

Filed Under: administration and orchestration, alerts, cloud, edge and everything in between, cybersecurity and cyber warfare, news Tagged With: DROWN, HTTP/2, OpenSSL

Create a Content Security Policy to Protect Your Web Application against XSRF/CSRF/XFS, Clickjacking and Other Code Injection Attacks

Filipe Martins 2016-02-22 Leave a Comment

Create a Content Security Policy to Protect Your Web Application against XSRF/CSRF/XFS, Clickjacking and Other Code Injection Attacks

[Updated 2019-03-17] Are you wondering why some JavaScript code from external domains simply won’t execute on your website? The reason could be as simple as an overly restrictive Content Security Policy (CSP for short). This article explains how you can create a Content Security Policy that’s both protective and functional. It will help you to secure your web server from some types of cross-site request forgery (XSRF/CSRF/XFS), clickjacking and other code injection attacks.

[Read more…]

Filed Under: administration and orchestration, cloud, edge and everything in between, cybersecurity and cyber warfare, encryption, Uncategorized, web servers in the cloud Tagged With: CSP, cyber defense, cyber security, cybersecurity, NGINX

How to renew a Letsencrypt certificate

Anna E Kobylinska 2016-02-21 Leave a Comment

How to renew a Letsencrypt certificate

In a post titled How to Set Up Letsencrypt, the SSL-Certificate Engine for the Cloud Era of Hyperscale, on AWS EC2, we have introduced you to this free, open, and fully automated Certificate Authority backed by the likes of Facebook (a gold sponsor), and discussed a manual setup for adventurers in How to Use Letsencrypt across Servers in the Manual Configuration Mode with a CSR.

Now is the time to discuss how to extend the validity of a Letsencrypt certificate for up to another 90 days of blissful happiness.

[Read more…]

Filed Under: administration and orchestration, cloud, edge and everything in between, cybersecurity and cyber warfare, encryption, mail servers, web servers in the cloud Tagged With: certificate, letsencrypt, SSL

How to Restore Your Instance Data from a Backup using Snapshots on AWS EC2/EBS

Filipe Martins 2016-02-16 Leave a Comment

How to Restore Your Instance Data from a Backup using Snapshots on AWS EC2/EBS

You are writing all these backups as individual EC2 snapshots and/or full AMIs on AWS EC2 but how can you actually use them, should disaster befall your data?

Here is how to do that on Linux.

[Read more…]

Filed Under: administration and orchestration Tagged With: AWS, EBS, EC2

  • « Previous Page
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • 19
  • Next Page »

Subscribe

SSL/TLS Certificate Square (250 x 250)

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

©2022 CybrAnalytiqa OÜ

  • Content purchasing and syndication