Trending

#securityengineering

Latest posts tagged with #securityengineering on Bluesky

Latest Top
Trending

Posts tagged #securityengineering

Preview
What is the Model Context Protocol (MCP) Interested in understanding Model Context Protocol? This concise overview explains MCP's role in optimizing data interactions and evaluating SIEM deployments.

MCP is what makes “AI in the SOC” usable.

Not the model. The integration layer. Standard connections to tools and data with controls that security teams can live with.

Breakdown: graylog.org/post/what-is...

#MCP #SecurityEngineering

1 0 0 0
What Happens When Experimental Agentic AI Moves Into Production, Interacts with Systems, and Takes Actions Ev Kontsevoy, CEO and Co-Founder of Teleport, discusses agentic AI moving into production, and the need for a unified identity layer with stronger governance.

Read the full interview:
www.technadu.com/what-happens...

What’s your take - are organizations ready to treat identity and access as engineering problems instead of policy exercises?

#AgenticAI #IdentitySecurity #IAM #CloudSecurity #Automation #CyberRisk #SecurityEngineering #Governance

0 0 0 0
Preview
The End of the Machine Metaphor in Cybersecurity

What if your network wanted to be secure? 🧵 In Episode 1 of "The Morphogenetic SOC," we’re using Michael Levin’s TAME framework to redefine cyber defense. #CyberSecurity #AI #zeroknowledge #evolutionaryalgorithms #agentic #SOC #securityengineering open.spotify.com/episode/4Pam...

0 0 0 0
Post image

Most Java input validation assumes ASCII-era rules.
Unicode breaks that assumption.

A deep dive into Unicode security:
• invisible characters
• homograph attacks
• BiDi overrides
• production-grade defenses in Quarkus

buff.ly/4sTgaBx

#Java #Quarkus #Unicode #SecurityEngineering #BackendDev

3 2 0 0
Preview
Learn Ethical Hacking Using BlackArch Linux: A Complete Roadmap Ethical hacking is no longer a niche skill reserved for security teams in large enterprises. In 2026, it has become a core discipline for…

This guide is designed for real-world learning, not theory — using the same tools and workflows that professional penetration testers trust.

Read the full guide here: medium.com/the-first-di...

#Linux #SecurityEngineering

0 0 0 0
Preview
State of AppSec 2026: Security at Engineering Speed | Report AI accelerated delivery. AppSec architecture didn't. Download the State of AppSec 2026 report to learn why scan-and-report hit a ceiling; and what comes next.

What’s your biggest AppSec bottleneck right now?

A) too many findings

B) low dev adoption

C) slow remediation / unclear ownership

D) tool sprawl

We cover what teams are doing to fix these in the Neo State of AppSec Report.

📥 projectdiscovery.io/whitepapers/...

#AppSec #SecurityEngineering

0 0 0 0

Disabling SSH keystroke obfuscation is debated. Some argue minimal security benefits in low-threat scenarios justify disabling for performance. Others warn against underestimating risks, emphasizing that context matters for secure configurations. #SecurityEngineering 3/6

0 0 1 0
Post image

Zero-Trust: The Paradox Behind the Cybersecurity Illusion
#ZeroTrust #CyberSecurity #AI #GPT #LLM #SecurityArchitecture #CTEM #InHouseSecurity #CyberRisk #Infosec #SecurityEngineering #TrustButVerify
vaptgpt.com
www.linkedin.com/pulse/zero-t...

0 0 0 0
Preview
Ledig tjänst: Säljansvarig Security Engineering Vi söker en teknisk konsultsäljare som vill ta ett större ansvar och vara med och bygga upp ett växande affärsområde inom utvecklingsnära säkerhet.

Kom och jobba med mig!
@assuredab.bsky.social söker nytt blod. Bland annat en säljansvarig för #securityengineering #allthecybers #cra #nis2 #dora #sdlc

www.assured.se/sv/jobb/ledi...

2 1 0 0
Preview
The Rise of the SSE-Engineer: Why This Cybersecurity Role Is in High Demand Phones, laptops, and branch networks no longer define the corporate perimeter. Workforces have stretched across homes, coworking spaces, and global locations.

Why is the SSE-Engineer role becoming one of the most sought-after jobs in cybersecurity?
🔐 Discover the factors driving its rapid rise in this article.
www.linkedin.com/pulse/rise-s...

#SSE #CyberSecurityJobs #SecurityEngineering #Infosec

0 0 0 0

If you manage open-source dependencies, this incident is a wake-up call. The real lessons are strategic: maintenance, ownership, and understanding the blast radius of every component you ship.
Read more: buff.ly/LSA5qfq
#ApplicationSecurity #HAProxy #VulnerabilityManagement #SecurityEngineering 🧵6/6

1 0 0 0

HAProxy’s team didn’t shrug this off. They owned the issue, explained the impact clearly, and forked the dependency to deliver a real fix. That level of transparency is rare—and appreciated.
#SecurityEngineering #DevSecOps #RiskManagement 🧵3/6

0 0 1 0
Post image

v0.13.0 expands audit capabilities with a dedicated UI for managing export jobs — schedule exports, filter logs, and send them to S3, GCS, Azure, or any S3-compatible backend.

→ buff.ly/mRxAYdl

#ModelContextProtocol #SecurityEngineering

0 0 0 0

While Ron Woerner's Canon review was of the 2008 2nd edition, Dr. Anderson has since released a 3rd edition just a few years ago.

🛍️ If interested in purchasing the book, please consider using our affiliate link: amzn.to/47NiFa4

#CybersecurityBooks #SecurityEngineering

1 0 0 0

Actions: upgrade Rancher to 2.12.2 / 2.11.6 / 2.10.10 / 2.9.12. Enforce allowlists for SAML params, shorten token TTLs, and train admins to verify login URLs. Review audit logs for suspicious re-auth flows. #SecurityEngineering #BlueTeam #IncidentResponse 🧵4/5

0 0 1 0

Exciting job opportunity at Ramp! We have a full-time Security Engineer | Cloud position available. Workplace: on-site in New York. Salary Range: $211,400 - $290,600 per year. #JobOpportunity #SecurityEngineering

0 0 1 0
Preview
Mastering Security in Your Kubernetes Infrastructure with Omni and Talos Linux - Sidero Labs The complexity of Kubernetes infrastructures can allow for blind spots that open the door to bad actors. Talos Linux and Omni change that.

🔐SSH and shell-free
🧱Immutable by default
🔁Trusted Boot out of the box

Because we believe security starts at the foundation. Here's what makes Talos Linux different.

🔗 www.siderolabs.com/blog/masteri...

#Kubernetes #TalosLinux #DevSecOps #CloudNative #SecurityEngineering

2 0 0 0
Post image

Tired of fragmented security tools? Learn to seamlessly integrate container security into your CI/CD. Our upcoming webinar shows you how to connect Anchore and DefectD... go.anchore.com/using-anchore-defectdojo... #DevSecOps #ContainerSecurity #AppSec #SecurityEngineering

0 0 0 0
Preview
DevSecOps in the Age of Autonomous AI: What Gets Better, What Gets Worse As autonomous AI enters the DevSecOps pipeline, teams gain speed and proactive defense—but also face new risks. This opinion piece dives into what AI improves, what it complicates, and how workflows and culture must evolve to stay secure, explainable, and in control.

Automation made us fast.
AI agents might make us fearless—or reckless.
In this deep-dive opinion piece, we explore how DevSecOps evolves when autonomous AI joins the team.
What gets better? What gets worse? Let’s talk.

#DevSecOps #AI #Automation #SecurityEngineering #TechLeadership #AIInSecurity

0 0 0 0
Preview
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication | Proofpoint US Key takeaways  Proofpoint identified a new, rebranded stealer based on ACR Stealer called Amatera Stealer.   It is delivered via web injects featuring sophisticated attack

In a new blog, Proofpoint threat research engineers disclosed their detailed discovery of Amatera Stealer, a newly rebranded and upgraded malware-as-a-service (MaaS) version of the ACR Stealer.

Read the blog: brnw.ch/21wTvpI.

#securityengineering #detectionengineering #securitycontrols

2 1 1 0

Blast radius matters.
But most teams reduce it by narrowing perimeters—not by shifting control to where the risk actually is.
Want real resilience?
Push your controls closer to the data and decisions.
#SecurityEngineering #DataCentricSecurity

1 0 0 0

The role of GitHub MCP was also debated. Is it responsible, or just a tool exposing the API? Some suggest MCP could add security layers like better permission systems or clearer UI for access grants. #SecurityEngineering 6/6

0 0 0 0
Post image

Navigating the #FedRAMP authorization process? This whitepaper provides a comprehensive overview of the framework, key stakeholders, and the 5-step process for SaaS, PaaS, and I... https://get.anchore.com/unlocking-the-federal-market/ #FedRAMP #CloudSecurity #Compliance #GovTech #SecurityEngineering

0 0 0 0
Post image

Get hands-on with EKS security! Our upcoming webinar on May 20 with Bion Consulting provides a technical deep dive into Shift Right Security on EKS using Anchore. Shift Right? Ye... get.anchore.com/shift-right-security-for... #EKS #KubernetesTraining #SecurityEngineering #DevOps

0 0 0 0
Video

Learning in public for reaaal!

Another golang project, now we're building security tooling in public. Just started this new project, i'll be posting on it more here!

#securityengineering #learninginpublic

3 0 0 0
Post image Post image Post image Post image

O custo que não aparece no orçamento.

Participe do nosso acesso antecipado e veja como estamos resolvendo esse desafio: getup.io/en/lp/images

#DevSecOps, #SecurityEngineering, #CloudArchitecture, #PlatformEngineering, #SecurityCulture, #RiskManagement, #Compliance, #CloudGovernance

0 0 1 0
Post image

Are you passionate about cybersecurity, security engineering, and compliance? Join our team as a Cybersecurity & Security Engineering Specialist.

Apply now: bit.ly/42auLJ1

#CyberSecurityJobs #SecurityEngineering #TechCareers #ComplianceCareers #JobsinBromley

0 0 0 0

Remote backups setup for one of the platforms I manage. Biggest challenge, getting IP Tables to PAT the agent ports through my multi-tier architecture and down on to the tin where the backups actually live.

#securityengineering

0 0 0 0
Preview
Why can deleted files be recovered? Understand how deleted data on SSDs can be recovered and the role of the TRIM command, encryption, and forensic techniques used in digital investigations. # Components of an SSD Solid State Drives (SSDs) are made up of module(s): ➡️ DRAM (Cache): speeds up read/write operations; ➡️ Nand Memory: allows data storage; ➡️ Controller: Manages all SSD operations # What is DRAM? DRAM is a type of volatile memory that temporarily stores data. It is made up of cells that store bits. This DRAM module is used as a cache to temporarily store data being read or written, improving the device’s access speed and efficiency. # The Controller’s Role The SSD controller is a chip that manages data reading and writing to NAND flash memory cells. This component is vital for the device’s performance and durability, and it contains the Flash Translation Layer (FTL). The main functions of FTL are: * Translate commands received from the operating system to flash memory; * Maintain a mapping between the logical address and the physical address of the data; * Perform garbage collection on memory blocks; and * Distribute SSD operations among memory blocks to reduce wear. This function is known as Wear Leveling. # How NAND Memory Works NAND Memory is a non-volatile memory technology that stores data in memory cells organized in a matrix structure. NAND memory is made up of numerous memory cells that are organized into pages and blocks. ## Memory Cells Storage cells are organized in layers, similar to a ream of A4 paper. Within each cell, there are several blocks responsible for effectively storing file data. These components have a limited lifespan. Each time information is created (or modified, or deleted), this lifespan decreases. To address this issue, the FTL (Flash Translation Layer) distributes operations evenly, preventing certain blocks from wearing out faster than others. The operating system does not have direct access to this part of the SSD; for this, the use of the Flash Translation Layer (FTL) is required, which facilitates integration between them. # Why Can Data Be Recovered? When a file is deleted, the operating system signals to the FTL (Flash Translation Layer) that the space used by the file can be reused for another. The FTL marks the spaces as free, but the bits of information remain in the cell until they are overwritten later. This strategy, in addition to preventing wear — as already explained — also improves performance. Erasing entire blocks is more efficient than erasing individual cells. Therefore, after you delete a file from your SSD, forensic experts can attempt to directly access the memory cells using specific devices to recover the deleted data. An SSD with many gigabytes or terabytes that is lightly used can retain deleted information for years. # How to Ensure Permanent Deletion? When working with personal data (such as contracts, SSH keys, and database backups), you must take specific precautions with files — particularly if your company needs to comply with the General Data Protection Law. ## ❓ I used the Eraser, BitRaser, Shred apps, etc. Congratulations!! Some of these apps work on 90s-era HDDs. On SSDs, they still don’t permanently delete the file. Back in the early 1990s, computer scientist Peter Gutmann created an algorithm to overwrite empty spaces on HDDs. The goal was to rewrite the same file 35 times to prevent the original content from being recovered. However, this technique does not work on modern storage devices. ## ❓ How can I securely delete files containing my data, then? The National Security Agency (NSA) recommends that storage devices be shredded into pieces no larger than 2mm. This is an extreme measure, but there are other alternatives. # The TRIM Command The TRIM command is an instruction sent by the operating system to the SSD, indicating which data blocks are no longer in use and can be erased. Once TRIM is executed, recovering deleted files becomes much more difficult — though not impossible. > **Attention!** Not every SSD and not every operating system supports this instruction. # Software Encryption Full disk encryption aims to make data access more difficult, ensuring that the information stored on the device is accessible only to authorized users, such as those who have the password, a key file, or a hardware authentication device (like a Yubikey, for example). Windows, for instance, uses BitLocker to implement full disk encryption. However, this does not guarantee that the data is completely inviolable. The study “Is My Password Strong Enough?: A Study on User Perception in The Developing World” revealed that many users choose predictable and weak passwords, such as personal information and common patterns. Password reuse is also a significant issue, with 69% of participants admitting to this practice. # Hardware Encryption This is a technique that uses dedicated components, such as encryption controllers and chips, to protect data stored on SSD devices. This approach offers advantages over software encryption, particularly when it comes to the difficulty of recovering data after deletion or destruction of the device. However, the cost of such devices may not be attractive to most people. On the market, there are some devices like the IronKey Vault Privacy 80 8TB External SSD, which can cost up to $900; and the ORICO 2TB mSATA SSD for internal use, which can cost $130. > It’s not a paid post, but it could be 🥲 # Conclusion In an increasingly digital world, the protection of sensitive data is a priority. Full disk encryption and the use of commands like TRIM on SSDs are effective tools to ensure that information remains secure against unauthorized access. However, it is important to remember that, even with these security measures, file deletion does not guarantee permanent removal. There are secure file deletion techniques that can help mitigate the risk of data recovery, but the only truly secure way to ensure that information cannot be recovered is through the physical destruction of the device, reducing it to particles no larger than 2 mm. This approach ensures that the data cannot be accessed in any way, providing an additional layer of security for critical information. Therefore, when considering data protection, it is essential to adopt a comprehensive approach that includes both encryption and secure device destruction when necessary.
0 0 0 0