Systems | Development | Analytics | API | Testing

Security

Defend Your APIs: Secure by Design

The digital landscape has witnessed an explosion of APIs in recent years. These powerful tools act as the glue binding applications together, facilitating data exchange and powering our interconnected world. But with this rapid rise comes a growing concern: securing these APIs to safeguard sensitive information. In our recent webinar at SmartBear, "Defend Your APIs: Secure by Design," API experts Frank Kilcommins and Yousaf Nabi unpacked some critical strategies for keeping your APIs safe.

FedRAMP In Process Designation, A Milestone in Cybersecurity Commitment

It’s been said that the Federal Government is one of, if not the largest, producer of data in the United States, and this data is at the heart of mission delivery for agencies across the civilian to DoD spectrum. Data is critical to driving the innovation and decision-making that improves services, streamlines operations and strengthens national security.

Snowflake Data Clean Rooms: Securely Collaborate to Unlock Insights and Value

In December 2023, Snowflake announced its acquisition of data clean room technology provider Samooha. Samooha’s intuitive UI and focus on reducing the complexity of sharing data led to it being named one of the most innovative data science companies of 2024 by Fast Company. Now, Samooha’s offering is integrated into Snowflake and launched as Snowflake Data Clean Rooms, a Snowflake Native App on Snowflake Marketplace, generally available to customers in AWS East, AWS West and Azure West.

What Can Possibly Go Wrong Without Data Privacy in Your Business?

Let's talk about something that might not be your favorite topic but is super important: data privacy and security. Now, I know it might sound like just another box to tick off, but hear me out. Ignoring data privacy in today's digital world is like forgetting to lock your doors in a busy neighborhood. Not the best idea, right? We previously discussed the importance of data privacy in analytics, let’s now look at the implications of lack thereof.

Enabling Secure Data Exchange with Decentralized APIs

Stop me if you’ve heard this one before, but there’s a lot of data out there — and the amount is only growing. Estimates typically show persistent data growth roughly at a 20% annual compounded rate. Capturing, storing, analyzing, and actioning data is at the core of digital applications, and it’s critical for both the day-to-day operations and detecting trends, for reporting, forecasting, and planning purposes.

Leveraging AI and Analytics in Your Data Privacy Program

In an age of rapid technological transformation, governments are playing regulatory catch-up as they try to keep pace with technological developments and the increasing amount of personal identifiable information (“PII”) generated by our every-day lives. Privacy laws regulating the use of PII continue to strengthen (Gartner estimates that while 10% of the world’s population was covered by comprehensive privacy laws in 2020, by year-end 2024 it will be 75%).

Comprehensive Guide to Continuous Threat Exposure Management (CTEM)

In an era where businesses are adopting digital transformation at a rate that is beyond comprehension, exposure management is a critical component of any strategy to successfully handle the omnipresent problem of mitigating cyberattacks, data breaches, and other security threats. Businesses could profit from adopting new technology and digital services, but doing so expands the attack surface, making them more vulnerable to forthcoming attacks.

Securing Access: A Guide to Implementing API Keys in AWS API Gateway

Implementing an API gateway API key is key to securing your APIs. In this guide, you’ll learn to generate and apply these keys, ensuring your AWS API gateway effectively authenticates and processes authorized client requests. We’ll dive into setup procedures, management tips, and security best practices to help you maintain robust access control. Get ready to fortify your services’ entry points.

Secure Internal Microservice Authentication: A Comprehensive Guide

Internal microservice authentication is a critical component of software development. It ensures that only authorized users and services can access sensitive information and perform actions within a system. With the rise of microservices architecture and the increasing complexity of modern software ecosystems, implementing effective authentication mechanisms for internal microservices has become more important than ever.