<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Dr. Swarup Kumar Sahoo</title>
    <description>The latest articles on DEV Community by Dr. Swarup Kumar Sahoo (@drsahoo).</description>
    <link>https://dev.to/drsahoo</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F501774%2F6816ec06-415a-444f-ac64-2d3ac99e2812.jpeg</url>
      <title>DEV Community: Dr. Swarup Kumar Sahoo</title>
      <link>https://dev.to/drsahoo</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/drsahoo"/>
    <language>en</language>
    <item>
      <title>Open Source Tool Deepfence SecretScanner to Detect Secrets and Reduce Attack Surface</title>
      <dc:creator>Dr. Swarup Kumar Sahoo</dc:creator>
      <pubDate>Thu, 18 Feb 2021 14:39:16 +0000</pubDate>
      <link>https://dev.to/drsahoo/open-source-tool-deepfence-secretscanner-to-detect-secrets-and-reduce-attack-surface-225m</link>
      <guid>https://dev.to/drsahoo/open-source-tool-deepfence-secretscanner-to-detect-secrets-and-reduce-attack-surface-225m</guid>
      <description>&lt;p&gt;We have released an open source tool &lt;a href="https://github.com/deepfence/SecretScanner"&gt;SecretScanner&lt;/a&gt; to scan container images and hosts for finding any potential passwords and secrets automatically before deploying your cloud native workloads. &lt;/p&gt;

&lt;p&gt;In addition to Vulnerabilities, secrets form an important part of your attack surface. Leakage of secrets can put your organization into serious security risk. Our &lt;a href="https://github.com/deepfence/SecretScanner"&gt;SecretScanner&lt;/a&gt; tool will help you to reduce your attack surface and protect your infrastucture. Check out our &lt;a href="https://medium.com/deepfence-cloud-native-security/detecting-secrets-to-reduce-attack-surface-3405ee6329b5"&gt;blog&lt;/a&gt; more more details.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cloud</category>
      <category>serverless</category>
      <category>docker</category>
    </item>
    <item>
      <title>Observability and Security of Fargate Serverless Deployments</title>
      <dc:creator>Dr. Swarup Kumar Sahoo</dc:creator>
      <pubDate>Sun, 24 Jan 2021 14:29:11 +0000</pubDate>
      <link>https://dev.to/drsahoo/observability-and-security-of-fargate-serverless-deployments-25mg</link>
      <guid>https://dev.to/drsahoo/observability-and-security-of-fargate-serverless-deployments-25mg</guid>
      <description>&lt;p&gt;While serverless platforms such as fargate are gaining popularity, securing them is a big challenge. In this article, we outline some of the issues in monitoring and securing fargate deployments.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://medium.com/deepfence-cloud-native-security/observability-and-security-of-fargate-serverless-deployments-c9529a74b044"&gt;https://medium.com/deepfence-cloud-native-security/observability-and-security-of-fargate-serverless-deployments-c9529a74b044&lt;/a&gt; &lt;/p&gt;

</description>
      <category>security</category>
      <category>serverless</category>
      <category>aws</category>
      <category>kubernetes</category>
    </item>
    <item>
      <title>Vulnerability Vs Exploitability - Leveraging Exploitability for Vulnerability Management</title>
      <dc:creator>Dr. Swarup Kumar Sahoo</dc:creator>
      <pubDate>Thu, 29 Oct 2020 17:02:21 +0000</pubDate>
      <link>https://dev.to/drsahoo/vulnerability-vs-exploitability-leveraging-exploitability-for-vulnerability-management-io8</link>
      <guid>https://dev.to/drsahoo/vulnerability-vs-exploitability-leveraging-exploitability-for-vulnerability-management-io8</guid>
      <description>&lt;p&gt;Thousands of vulnerabilities are disclosed every month and developers get overwhelmed while managing so many vulnerabilities in their cloud infrastructure. Read our blog post on how Deepfence ThreatMapper helps developers and security analysts to prioritize and mitigate their most exploitable vulnerabilities in an efficient manner.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://medium.com/deepfence-cloud-native-security/exploitability-vs-vulnerability-leveraging-exploitability-for-vulnerability-management-2c27b46eebf2"&gt;https://medium.com/deepfence-cloud-native-security/exploitability-vs-vulnerability-leveraging-exploitability-for-vulnerability-management-2c27b46eebf2&lt;/a&gt;&lt;/p&gt;

</description>
      <category>kubernetes</category>
      <category>devops</category>
      <category>security</category>
      <category>docker</category>
    </item>
  </channel>
</rss>
