Systems | Development | Analytics | API | Testing

Security Risks On Rails: Misconfiguration and Unsafe Integrations

In the third and final article of our series on the OWASP Top 10 Web Application Security Risks, we’ll explore the lesser-known risks associated with the development of web applications on Rails when it comes to threats involving security misconfiguration, JSON escaping, etc.

Embracing Failure With Gremlin Chaos Engineering

In this episode of Kongcast, I spoke with Jason Yee, director of advocacy at Gremlin, about the concept of chaos engineering, why even the best engineers can’t control everything, and tools and tactics to help build app resiliency. Check out the transcript and video from our conversation below, and be sure to subscribe to get email alerts for the latest new episodes.

Six testing insights to optimize your 2022 QA strategy

Modern QA strategies go beyond bug hunting best practices and have become in-depth philosophical, methodological cultures precisely crafted to an individual business’s goals. For brands that want high-quality digital products, QA is a critical tool in all parts of the dev cycle and the CI/CD pipeline. As a new year promises new challenges, products, and shifting consumer demands, technicality, functionality, and thorough QA will be critical to business success.

How to Start E-Commerce Integration

As the world’s number one CRM provider, Salesforce has been transforming customer relationship management for the last two decades across various e-commerce platforms and e-commerce websites. From increased communication to improved customer relationships to better business plans, the Salesforce platform has helped countless organizations move a step above their competitors.

Webhooks Explained - What are they & Which tools are best to create them?

As project needs evolve and expand, people need tools or software to enhance business operations and improve productivity. Over the past few years, several frameworks have been designed to aid the development of such tools and software, and among them webhooks are prominent ones. Webhooks are essentially tools used to automate business processes and allow organizations to provide interactive capabilities to customers.

Web Security Attacks You Must Know - Part 2

The world is a digital place today. We fulfil most of our work, social and family tasks virtually, using the internet. The technology is now so universal, with so few barriers to entry, that practically anyone can connect to this global grid, no matter their technical skills. However, there is a flip side. Many people lack security awareness and knowledge, which can have drastic impacts on their social and financial life.

Syslog Tutorial: Everything You Need to Know

Syslog is a protocol that allows you to transmit and receive notifications in a predefined format from various network devices. Timestamps, event messages, severity, host IP addresses, diagnostics, and other information are included in the messages. It may transmit a range of severity levels, including level 0, which is an emergency, level 5, which is a warning, System Unstable, critical, and levels 6 and 7, which are Informational and Debugging.

The Ultimate Guide to Logging in Python

Logging is used to track events that happen when an application runs. Logging calls are added to application code to record or log the events and errors that occur during program execution. In Python, the logging module is used to log such events and errors. An event can be described by a message and can optionally contain data specific to the event. Events also have a level or severity assigned by the developer. Logging is very useful for debugging and for tracking any required information.