Ops Development & AI Practice
Ops Development & AI Practice
Jun 3, 2025 · Information Security

Designing a Multi‑Layer Database Audit System for Financial Applications

This article outlines a comprehensive, multi‑layer database audit architecture for financial systems, covering principle‑of‑least‑privilege service accounts, database activity monitoring, log correlation, optional code scanning, API injection detection, regular security drills, and development‑side safeguards to ensure traceable, compliant data access.

DAMFinancialdatabase
0 likes · 15 min read
Designing a Multi‑Layer Database Audit System for Financial Applications
21CTO
21CTO
Aug 23, 2024 · Information Security

Why Do Companies Fail at Data Security? Common Pitfalls and Solutions

This article examines why many enterprises repeatedly suffer data breaches, highlighting common security flaws such as manual permission management, account sharing, lack of least‑privilege, insufficient environment isolation, weak audit logging, and offers practical recommendations to strengthen information security.

Audit LoggingData SecurityInformation Security
0 likes · 14 min read
Why Do Companies Fail at Data Security? Common Pitfalls and Solutions
MaGe Linux Operations
MaGe Linux Operations
Apr 5, 2022 · Information Security

Essential Docker Security Practices: Hardening Images and Containers

This article explains Docker's role in modern development, distinguishes images from containers, and provides concrete security measures—including least‑privilege users, minimal base images, multi‑stage builds, and AppArmor profiles—to harden Docker deployments against attacks.

AppArmorContainer SecurityDocker
0 likes · 11 min read
Essential Docker Security Practices: Hardening Images and Containers
21CTO
21CTO
Apr 15, 2021 · Information Security

Essential Secure Coding Practices Every Developer Should Follow

This article presents practical secure coding guidelines—including input escaping, avoiding auto‑increment IDs, minimalist HTTP methods, least‑privilege design, mandatory HTTPS, strong encryption algorithms, and whitelist‑based execution—to help developers embed real‑time security into modern software.

EncryptionHTTPSSQL Injection
0 likes · 7 min read
Essential Secure Coding Practices Every Developer Should Follow
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Sep 23, 2020 · Information Security

Mastering Security Architecture Reviews: Principles, Models, and Practical Steps

This article explains how to conduct comprehensive security architecture reviews by covering fundamental design principles, the three pillars of security controls, a practical review model, and detailed guidance on threat modeling, asset identification, and mitigation strategies for modern applications.

Security ArchitectureSecurity ReviewThreat Modeling
0 likes · 24 min read
Mastering Security Architecture Reviews: Principles, Models, and Practical Steps
FunTester
FunTester
Jan 9, 2020 · Information Security

Essential Security Checklist for Web Apps: From Unit Tests to Encryption

This article presents a practical checklist for securing web applications, covering unit testing, access control, change tracking, admin privilege management, least‑privilege principles, remote redundancy, monitoring, encryption, automated security scanning, and SQL injection prevention, offering actionable guidance for developers.

Encryptionaccess controlleast privilege
0 likes · 7 min read
Essential Security Checklist for Web Apps: From Unit Tests to Encryption
GF Securities FinTech
GF Securities FinTech
Sep 14, 2016 · Information Security

Securing Docker Microservices: Key Strategies from DockerCon 2016

At DockerCon 2016, Aaron Grattafiori outlined a comprehensive security framework for container‑based microservices, emphasizing user namespaces, custom AppArmor/SELinux policies, sec‑comp whitelists, hardened host OS, limited host access, network security, immutable containers, and secret management to achieve high‑assurance deployments.

AppArmorContainer SecurityDocker
0 likes · 11 min read
Securing Docker Microservices: Key Strategies from DockerCon 2016