Cloudy with a chance of an attack
@CloudyCISO
Followers
329
Following
0
Media
59
Statuses
660
All things AI, Security, Stocks and Investments
Some mental state
Joined August 2019
[ Microservices - Authentication Mechanisms ] Give it a read 👇 Pro tip => These Authentication Mechanisms/Types are not limited just to microservices. [1.] 𝐀𝐏𝐈 𝐊𝐞𝐲𝐬 ◾ Simple, unique identifiers assigned to each client or service. ◾ Sent as a header or query parameter
16
124
684
Load Balancer vs Reverse Proxy vs API Gateway (explained in 2 mins or less):
29
266
2K
Ever wondered how HTTPS actually keeps your data safe? Here’s what happens behind the scenes every time you visit a secure website 1️⃣ TCP Handshake – Your device and the server agree to communicate. 2️⃣ Certificate Check – The server proves its identity with a trusted
1
104
638
Things Every Developer Should Know: JSON Web Token (JWT). JWTs are one of the most widely used methods for API authentication, providing a secure, stateless and scalable way to verify clients. Here’s a simple-to-understand breakdown of how it works (step by step): 𝟭)
6
82
497
Session, Cookie, JWT, Token, SSO, and OAuth 2.0 Explained in One Diagram
11
230
2K
Load Balancer vs Reverse Proxy vs API Gateway A Thread 🧵
11
252
2K
During RSA week I had the pleasure of interviewing @philvenables (former Google Cloud & Goldman Sachs CISO) on effectively scaling security programs, how Google leverages AI for security, and more. We discussed: * The challenge of scaling security from artisanal to industrial *
1
5
16
🤓 OpenAI recently published an interesting threat report about how threat actors are using generative AI. Here is a quick rundown: 👇 - Fake Jobs: IT workers using AI for deceptive hiring schemes. - China IO: “Sneer Review” creates fake reviews and posts. - Philippines IO:
4
22
61
RT to help Simon raise awareness of prompt injection attacks in LLMs. Feels a bit like the wild west of early computing, with computer viruses (now = malicious prompts hiding in web data/tools), and not well developed defenses (antivirus, or a lot more developed kernel/user
If you use "AI agents" (LLMs that call tools) you need to be aware of the Lethal Trifecta Any time you combine access to private data with exposure to untrusted content and the ability to externally communicate an attacker can trick the system into stealing your data!
100
535
3K
If you use "AI agents" (LLMs that call tools) you need to be aware of the Lethal Trifecta Any time you combine access to private data with exposure to untrusted content and the ability to externally communicate an attacker can trick the system into stealing your data!
87
542
2K
Top API Security Practices for 2025🔥 Which one should we add next? - - - - - - - - - - - - - - 🔥@SketechWorld
2
6
40
Deleting your browser history doesn’t delete your actual history. Google still knows everything. If you truly want to wipe your digital footprint, here’s how to do it properly:
59
735
4K
#dash2025 #ddog #datadog the #security #siem #datasecurity #codesecurity #apisecurity #cloudsecurity #vulnerabilitymanagement #aisecurity company. Very bullish as a security company.
0
0
0
OAuth 2.0 Flows Visualized Note: The Implicit Flow is no longer recommended due to security vulnerabilities. Consider using the Authorization Code Flow with PKCE for enhanced security.
4
94
594