Click any tag below to further narrow down your results
Links
This article discusses new architecture patterns for implementing zero-trust data access in AI training, applicable to both cloud and on-premises workloads. It highlights the importance of securing data access to improve AI model training while minimizing risks. The author shares insights from their experience in designing secure systems.
This article lists the featured speakers at the Security Software Summit, highlighting key roles such as CISO, VP of Product Security, and Secure Coding Trainer. These professionals will share insights on security architecture, DevSecOps, and threat response strategies.
This guide explains JSON Web Tokens (JWTs) and their importance in building secure and scalable identity systems. It covers JWT components, use cases, and best practices to mitigate common vulnerabilities.
This article discusses two patterns for connecting agents to isolated execution environments called sandboxes. The first pattern runs the agent inside the sandbox, while the second keeps the agent on a local server and uses the sandbox as a tool. Each method has its own benefits and trade-offs regarding security, update speed, and separation of concerns.
AWS has launched SRA Verify, an open-source assessment tool designed to help organizations evaluate their alignment with the AWS Security Reference Architecture (AWS SRA). The tool automates checks across various AWS services to ensure that security configurations adhere to best practices, with plans for future enhancements and contributions from the community.
The article explores techniques and tools for reverse-engineering modern web browsers, focusing on the intricacies of browser architecture, security mechanisms, and debugging processes. It highlights the importance of understanding browser internals for both security researchers and developers aiming to enhance their web applications. Practical examples and methodologies are provided to aid in the reverse-engineering process.
Zellij has developed a web client that allows users to access terminal sessions through their browsers, effectively creating a dedicated terminal interface that can be bookmarked and accessed via URLs. The architecture involves a client/server model where a web server manages multiple sessions and ensures bi-directional communication with built-in security features. The implementation leverages Rust and various libraries to facilitate real-time interactions and maintain session integrity.
The article discusses the evolving role of API gateways in software architecture, highlighting various design patterns and trends anticipated for 2025. It emphasizes the importance of flexibility, security, and scalability in managing APIs effectively in modern applications. Key considerations for developers and organizations looking to implement or upgrade their API gateways are also outlined.
AIDR-Bastion is a GenAI protection system that employs multiple detection engines to analyze user inputs and safeguard against malicious activity. It supports various detection rules, integrates with popular platforms for enhanced functionality, and features a flexible architecture that allows for extensibility and real-time analysis. The system is designed to provide comprehensive defense against adversarial prompt engineering and other AI-related threats.
The article discusses gVisor, a container runtime that enhances security by providing a user-space kernel to isolate applications from the host operating system. It outlines its architecture, advantages, and potential use cases in environments requiring increased security and control over containerized applications.