Systems | Development | Analytics | API | Testing

Security

Displaying Google Dorking: Revealing Hidden Online Information | Security Testing | BugRaptors

Dive into the realm of Google Dorking, also known as Google Hacking, an advanced method leveraging specialized search queries to unveil concealed data, exposed databases, and potential security vulnerabilities across the web. Join us as we explore the responsible application of this technique for information retrieval and delve into the critical importance of safeguarding against potential risks lurking in the digital landscape.

Calling All White Hat Hackers!

Imagine a world where every piece of digital content can be verified and traced back to its source. Lindsay Walker, Product Lead at Starling Lab for Data Integrity, walks us through the emerging tools that could make this possible. While AI tools hold incredible potential for good, Lindsay also warns against threats and countermeasures needed to keep our virtual representations safe. She emphasizes the need to build provenance into tools, discusses blockchain use cases, and shares systems that implement hashes for security.

Data Security and Compliance: 5 Essential Considerations

With data continuously growing in complexity and quantity, ensuring data security is more important than ever when choosing to buy a business intelligence (BI) solution. From data protection to data governance, having a BI platform that enables you to control, audit, encrypt and manage user access and usage of sensitive data is essential.

Keeping Your APIs Safe: Best Practices for Top-Notch Security

Application programming interfaces (APIs) are everywhere, and they play a role in running nearly everything in our digital-centric lives. Each time we launch a web page or an app on our phone, dozens of API calls are happening in the background to render an experience heavily customized to you. Increasingly, even the everyday items in your home are talking to APIs — from smart speakers like Amazon Echo to appliances, electricity meters, and lightbulbs.

Transforming Security Operations: The Power of Adversary Emulation

The Security Operations team at Appian is responsible for detecting, responding to, and shutting down potential cybersecurity threats against our company. As an innovative and cutting-edge security team, we put a great deal of effort into coming up with new and novel ideas for how a potential threat may manifest. Threat ideas can come from domain industry experience, interacting with internal stakeholders, or reading security blogs.

Fireside chat on WSO2 Identity Server 7.0

WSO2 Identity Server is the leading open source IAM solution. It is a powerful, modern access management solution for your on-premises or cloud environment that provides secure access for your consumers (B2C), enterprise customers (B2B), workforce (B2E), or APIs. WSO2 Identity Server manages more than 1 billion identities worldwide, and its extensibility allows it to support the most complex IAM requirements.

Countly's Privacy-Focused Approach to Analytics for The Finance Industry

While our discussions have previously highlighted the unique analytics challenges and opportunities within industries such as automotive, healthcare, and kids' gaming, today, we turn our focus to the finance sector. In this article, we’ll zoom in on analytics challenges in the finance world, and we’ll answer why Countly is exceptionally suited for product analytics in the financial sector.