Systems | Development | Analytics | API | Testing

Security

Incorporating Privacy Enhancing Techniques in your Data Privacy Strategy

Maintaining data privacy is critical for modern enterprises. In this talk we will cover the degrees of identifiability and privacy-protection technologies for data pseudonymization, data de-identification, and data anonymization. Join this session to learn about the main threats to data privacy and technologies to privacy protect your data.

A Guide to WSO2 Identity Server

Identity and access management (IAM) is the efficient integration and management of identities, giving users access to the right resources at the right time. Identity is no longer a mere security project for enterprises. In the integration and API domain, as businesses continue to increase the number of internal and third-party APIs, it's more important than ever that APIs are integrated and governed securely. In the user domain, with increasing user identity spaces, company-wide policies, complex structure hierarchies and roles, regulatory pressures, and customer-facing applications, security becomes a bigger challenge each day for identity architects and administrators.

With Talend, cybersecurity leader Imperva trusts its data - if nothing else

The word “trust” is simply not in the cybersecurity solution providers’ vocabulary. They trust no one and nothing. They develop Zero Trust network architectures to protect clients against external attacks, insider threats, and inadvertent errors that could impact security. And they’re always on the lookout for emerging vulnerabilities across internal and external networks. Trust is a luxury they can’t afford to have — or can they?

New in Kong Konnect: Support for Okta + More Portal Customization

In February 2021, we announced the GA of Kong Konnect, the first cloud native service connectivity platform that gives organizations the flexibility of protecting their API and service traffic while simultaneously taking advantage of 10x ops improvements via the cloud control plane.

Simplifying Authentication for Microservices Security | Jeff Taylor | Okta | Episode 10

Still trying to add auth to each microservice's code? According to Jeff Taylor, Senior Product Manager at @OktaDev there’s an easier way! In this Kongcast, Jeff tells and shows us how to speed up microservices security and take the burden off developers by managing auth with an API gateway.

Security Reference Architecture Summary for Cloudera Data Platform

This blog will summarise the security architecture of a CDP Private Cloud Base cluster. The architecture reflects the four pillars of security engineering best practice, Perimeter, Data, Access and Visibility. The release of CDP Private Cloud Base has seen a number of significant enhancements to the security architecture including: Before diving into the technologies it is worth becoming familiar with the key security principle of a layered approach that facilitates defense in depth.

Why PII Pseudonymization is Crucial for Data Security

Data security is an important priority for every organization that handles customer or user data, especially those that fall under data privacy and protection laws such as the EU’s General Data Protection Regulation (GDPR). Large volumes of personal data flow in and out of companies and their systems every day, and the threat of data breaches looms over these operations. How can organizations use their data to power critical operations without running afoul of regulations or privacy concerns?