<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on hersoncruz.com</title>
    
    
    
    <link>https://www.hersoncruz.com/categories/security/</link>
    <description>Recent content in Security on hersoncruz.com</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Mon, 19 Aug 2024 07:22:23 -0600</lastBuildDate>
    
	<atom:link href="https://www.hersoncruz.com/categories/security/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>Advanced Web Security: Automating CSP, SRI, and Security Headers in Your CI/CD Pipeline</title>
      <link>https://www.hersoncruz.com/posts/advanced-web-security-automating-csp-sri-security-headers-ci-cd-pipeline/</link>
      <pubDate>Mon, 19 Aug 2024 07:22:23 -0600</pubDate>
      
      <guid>https://www.hersoncruz.com/posts/advanced-web-security-automating-csp-sri-security-headers-ci-cd-pipeline/</guid>
      <description>
        
          &lt;img src=&#34;https://www.hersoncruz.com/images/covers/advanced-web-security.jpg&#34;/&gt;
          
        
        
        
          Explore advanced web security techniques including Content Security Policy (CSP), Subresource Integrity (SRI), and automating these practices in your CI/CD pipeline to ensure robust protection against modern cyber threats.
          
        
        </description>
    </item>
    
    <item>
      <title>Automating Security Audits with Bash Scripts</title>
      <link>https://www.hersoncruz.com/posts/automating-security-audits-with-bash-scripts/</link>
      <pubDate>Sat, 03 Aug 2024 06:05:21 -0600</pubDate>
      
      <guid>https://www.hersoncruz.com/posts/automating-security-audits-with-bash-scripts/</guid>
      <description>
        
          &lt;img src=&#34;https://www.hersoncruz.com/images/covers/bash.png&#34;/&gt;
          
        
        
        
          Learn how to automate security audits using Bash scripts to ensure your systems remain secure and compliant. Perfect for both seasoned and novice sysadmins.
          
        
        </description>
    </item>
    
    <item>
      <title>Essential Security Practices for Sysadmins</title>
      <link>https://www.hersoncruz.com/posts/essential-security-practices-for-sysadmins/</link>
      <pubDate>Sun, 14 Jul 2024 06:53:24 -0600</pubDate>
      
      <guid>https://www.hersoncruz.com/posts/essential-security-practices-for-sysadmins/</guid>
      <description>
        
          
          
          
        
        
        
          Welcome to the inaugural post of “Security Sunday” on hersoncruz.com! Every Sunday, we’ll delve into essential security practices and share scripts that will help sysadmins fortify their servers and keep cyber threats at bay. Let’s get started with some foundational security practices and a few handy scripts to automate these tasks.
          
        
        </description>
    </item>
    
    <item>
      <title>Hardening SSH Service</title>
      <link>https://www.hersoncruz.com/posts/hardening-ssh-service/</link>
      <pubDate>Fri, 14 Oct 2016 08:44:01 -0600</pubDate>
      
      <guid>https://www.hersoncruz.com/posts/hardening-ssh-service/</guid>
      <description>
        
          
          
          
        
        
        
          Learn how to harden your SSH service with secure configurations and key-based authentication. This guide will walk you through setting up a public-private key pair, creating regular user keys, and configuring your SSH service for enhanced security. By following these steps, you will prevent root login, use non-standard ports, and ensure only key-based authentication is allowed, significantly improving your server’s security.
          
        
        </description>
    </item>
    
  </channel>
</rss>