Secure your code, from the start.

Tag

infrastructure as code

Coders Conquer Security Infrastructure as Code Series: Plaintext Storage of Passwords

18th May 2020

The key to most computer security these days involves passwords. Even if other security methods are employed, like two-factor authentication or biometrics, most organizations still employ password-based security as one element of their protection.…

Coders Conquer Security Infrastructure as Code Series: Disabled Security Features

4th May 2020

Attackers will always attempt to find easily exploitable vulnerabilities first and may even use a script to run through common weaknesses. It’s not unlike a thief checking all the cars on a street to see if any doors are unlocked, which is a lot easier than smashing a window.…