ToddySM
  • Product ManagementGeneral category for software development topics
  • CybersecurityCategory for topics related to security online
  • Cloud NativeGeneral category for Cloud Computing topics
  • Artificial Intelligence
  • Addressing the Current Challenges of Patching Container Vulnerabilities
    August 23, 2022

    Addressing the Current Challenges of Patching Container Vulnerabilities

    While working on a process of improving the container secure supply chain, I often need to go over the current challenges of patching container vulnerabilities. With the introduction of Automatic VM Patching, having those conversations are even more challenging because there is always the question: “Why can’t we patch containers the same way we patch…

  • Signatures, Key Management, and Trust in Software Supply Chains – Part 2: Exploiting Signatures
    February 8, 2022

    Signatures, Key Management, and Trust in Software Supply Chains – Part 2: Exploiting Signatures

    In Part 1 of the series Signatures, Key Management, and Trust in Software Supply Chains, I wrote about the basic concepts of identities, signatures, and attestation. In this one, I will expand on the house buying scenario, that I hinted about in Part 1, and will describe a few ways to exploit it in the…

  • Signatures, Key Management, and Trust in Software Supply Chains – Part 1: Identities, Signatures and Attestation
    January 9, 2022

    Signatures, Key Management, and Trust in Software Supply Chains – Part 1: Identities, Signatures and Attestation

    For the past few months, I’ve been working on a project for a secure software supply chain, and one topic that seems to always start passionate discussions is the software signatures. The President’s Executive Order on Improving the Nation’s Cybersecurity (EO) is a pivotal point for the industry. One of the requirements is for vendors…

  • Why Multi-Factor Authentication (2FA/MFA) Usage Numbers Will Not Improve Any Time Soon?
    December 13, 2021

    Why Multi-Factor Authentication (2FA/MFA) Usage Numbers Will Not Improve Any Time Soon?

    If you have missed the news lately, cybersecurity is one of the most discussed topics nowadays. From supply chain exploits to data leaks to business email compromise (BEC) there is no break – especially during the pandemic. Many (if not all) start with an account compromise. And if you ask any cybersecurity expert, they will…

  • To 404 or Not to 404 – Using HTTP Response Codes to Provide User-Friendly Error Messages in Microservices Implementation
    September 7, 2021

    To 404 or Not to 404 – Using HTTP Response Codes to Provide User-Friendly Error Messages in Microservices Implementation

    How often the following happens to you? You write your client code, you call an API, and receive a 404 Not found response. You start investigating the issue in your code; change a line here or there; spend hours troubleshooting just to find out that the issue is on the server-side, and you can’t do…

  • What do you need to know about Helm 2, Helm 3, and ACR?
    August 18, 2021

    What do you need to know about Helm 2, Helm 3, and ACR?

    In the last few months, I started seeing more and more customers using Azure Container Registry (or ACR) for storing their Helm charts. However, many of them are confused about how to properly push and use the charts stored in ACR. So, in this post, I will document a few things that need the most…

  • Configuring a hierarchy of IoT Edge Devices at Home Part 3 – Configuring Business Planning and Logistics (IT)
    May 11, 2021

    Configuring a hierarchy of IoT Edge Devices at Home Part 3 – Configuring Business Planning and Logistics (IT)

    In the last two posts Configuring a hierarchy of IoT Edge Devices at Home Part 1 – Configuring the IT Proxy and Configuring a hierarchy of IoT Edge Devices at Home Part 2 – Configuring the Enterprise Network (IT) we have set up the proxy and the top layer of the hierarchical IoT Edge network. This post…

  • Configuring a hierarchy of IoT Edge Devices at Home Part 2 – Configuring the Enterprise Network (IT)
    April 15, 2021

    Configuring a hierarchy of IoT Edge Devices at Home Part 2 – Configuring the Enterprise Network (IT)

    In my last post, I started explaining how to configure the IoT Edge device hierarchy’s IT Proxy. This post will go one layer down and set up the Layer 5 device from the Purdue model for manufacturing networks. Reconfiguring The Network While implementing network segregation in the cloud is relatively easy, implementing it with a…

  • Configuring a hierarchy of IoT Edge Devices at Home Part 1 – Configuring the IT Proxy
    March 31, 2021

    Configuring a hierarchy of IoT Edge Devices at Home Part 1 – Configuring the IT Proxy

    To provide support for the hierarchical Azure IoT Edge scenarios we started working on a connected registry implementation that will allow extension of the Azure container registry functionality to on-premises. For those of you who are not familiar with what a hierarchical IoT Edge scenario is, take a look at the Purdue network model used…

  • Embed the Origin Dockerfiles into Your Docker Container Images Using Labels
    February 24, 2021

    Embed the Origin Dockerfiles into Your Docker Container Images Using Labels

    With the recent Solorigate incident, a lot of emphasis is put on determining the origin of the software running in an enterprise. For Docker container images, this will mean to embed in the image the Dockerfile the image was built from. However, tracking down the software origin is not so trivial to do. For closed-source…

←Previous Page
1 2 3
Next Page→

  • WordPress
  • Bluesky
  • Mastodon
  • LinkedIn
  • YouTube
  • GitHub

About Me | Terms of Use | Cookie Policy | Privacy Policy

© 2025 toddysm.com

We use cookies and share your information with third parties to improve your experience, analyze traffic, and provide content tailored to your interests.
By using this website, you consent to the use of cookies. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

This is an necessary category.

Non Necessary

This is an non-necessary category.

Save & Accept
 

Loading Comments...