Systems | Development | Analytics | API | Testing

Security

Subdomain takeover: ignore this vulnerability at your peril

The Domain Name System (DNS) is often described as the address book of the Internet. A and AAAA records map a human-friendly hostname like honeybadger.io to some machine-friendly IP address like 104.198.14.52. Other types of DNS records also exist; in particular, CNAME records are records that map a hostname to some other hostname, thereby delegating IP resolution to the latter.

How to Manage Your API Policies with OPA (Open Policy Agent)

APIs are essential to modern applications, but managing access and security policies can be complex. Traditional access control mechanisms can fall short when flexible, scalable, and fine-grained control over who can access specific resources is needed. This is where OPA (Open Policy Agent) steps in. OPA provides a unified framework for consistently defining and enforcing policies across microservices, APIs, Kubernetes clusters, and beyond. Consistent policy management is essential for enterprises.

5 Ways Perforce Helps with DORA Regulation Compliance

In January 2025, the European Union (EU) will begin enforcing a new regulation called the Digital Operational Resilience Act (DORA). The DORA regulation mandates sweeping cyber resilience requirements for financial institutions and third-party information and communication technology (ICT) providers. In this blog post, we examine how two core Perforce offerings help financial institutions and their supporting ecosystem of service providers comply with the requirements laid out in the DORA regulation.

The Five Pillars of Customer Identity and Access Management #WordsUnplugged

Customer Identity and Access Management (CIAM), a subgenre of IAM, enables organizations to scale and ensure secure, seamless digital experiences for their customers, while collecting and managing customer identity data purposefully. Powerful CIAM solutions provide a variety of key features including customer registration, social logins, account verification, self-service account management, consent and preference management, single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication as well as other nice-to-have features.

SFTP to SFTP: Secure File Transfers for Modern Data Integration

Table of Contents Secure File Transfer Protocol (SFTP) has become an indispensable tool for organizations needing to securely move files between systems. With its robust encryption and reliability, SFTP ensures sensitive data is transferred in a way that meets modern security standards.
Featured Post

The Five Critical Pillars of Customer Identity and Access Management

In today's interconnected digital landscape, effective management of customer identities is not just a technical requirement but a strategic asset. Customer identity and access management (CIAM) systems are at the heart of this, ensuring secure and seamless user experiences across numerous digital interfaces. Whether for individual consumers or business clients, CIAM facilitates personalised interactions while safeguarding sensitive data, complying with global regulations, and improving business enablement and operational efficiency.

Protecting Customer Data In A Collaborative, Data-Sharing World | OneTrust

In this episode of "Powered by Snowflake," we hear from Ojas Rege, GM of Privacy and Data Governance at OneTrust, about his company's consent and privacy platform, a platform that helps organizations manage customer data in a way that allows for data sharing and collaboration without compromising data security and customer privacy. The conversation includes a discussion about the role Snowflake technology plays in providing this kind of capability as well as an in-depth demo of the OneTrust Snowflake Native Application.

Enhancing Security with IAM Roles in Confluent Managed Connectors

As cloud environments evolve, so must the security measures that protect them. With Confluent’s latest enhancement—AWS IAM role integration for managed connectors—you can now adopt temporary security credentials, reducing both the risk of long-term credential exposure and the operational burden of key management. This feature tightens security and simplifies access management for your data flows between AWS and Confluent Cloud.

Reducing Your Data Risk to Drive Innovation

Organizations today face a myriad of risks that can affect their operations, reputation and bottom line. Prime among them are the existential threats to your data, including infrastructure risks and data risks. Comprehensive data governance solutions enable you to address both your infrastructure and data risk to build a resilient and secure environment that supports your operations and protects your valuable data assets.