Systems | Development | Analytics | API | Testing

Security

Mobile app security is just like housekeeping

What is Appdome? How does it work? Is Appdome like a firewall for mobile applications? In this week’s episode of the Test Case Scenario, Appdome’s Senior Product Manager Kurt Dusek joins our panelists. They discuss the many incredible features of this cyber defense automation platform, how it detects and fights against cybersecurity threats, and more.

AI and Privacy: 3 Things Leaders Should Know for 2024

In the rapidly emerging artificial intelligence economy, organizations will split into two groups: those who are good at AI and those who are bad at business. Most experts agree that AI won’t replace humans, but instead augment us in a world of mixed autonomy. You’ll need new structures to harness AI’s transformative potential while managing its very real risks—the biggest of which is data privacy. So how can leaders handle AI and privacy risks?

Harness the Power of ChatGPT in Cybersecurity: Enhancing Threat Detection and Response

In recent years, cybersecurity has faced increasingly sophisticated threats, making it crucial for organizations to develop robust systems for threat detection and response. One emerging technology that holds promise in this domain is ChatGPT, an advanced natural language processing model developed by OpenAI. In this blog post, we will explore how ChatGPT can be leveraged to enhance threat detection and response in cybersecurity.

Managing Open Banking APIs with Kong

In the Open Banking ecosystem, Kong Gateway emerges as a pivotal tool. It ensures that financial institutions can comply with stringent regulatory standards and leverage the opportunities presented by this new, data-driven landscape. This article will cover an in-depth look at the open banking landscape. In the Open Banking ecosystem, Kong Gateway emerges as a pivotal tool.

4 AI Privacy Issues-and How to Combat Them

Artificial intelligence is changing the world. With use cases ranging from content generation to deep data analysis to detecting health issues, AI can greatly improve lives and enhance business outcomes. And with the explosion of generative AI services and large language models, we can expect AI to become even more ubiquitous than it already is. But AI isn’t perfect. In particular, AI privacy issues put organizations at risk or prevent adoption in the first place.

The Rise of Web3 Technology : Challenges & The Role of Security Testing

The growing potential of web3 is undeniably revolutionizing the internet, but its vulnerability to security threats has raised significant concern over its usage. In 2022, the web3 domain experienced a substantial onslaught, with 165 major attacks resulting in cumulative losses of $3.6 billion. In 2023, notably the third quarter, the domain further witnessed staggering financial losses exceeding $720 million due to security breaches in web3 systems.

Pushing the Boundaries of OAuth and OIDC Security - Push Authorization Request (PAR)

In the world of API security, OAuth 2.0 plays a crucial role in authorization. OpenID Connect (OIDC) works seamlessly with OAuth 2.0, providing an identity layer that ensures standardized authentication and user information for applications. Among various grant types, the Authorization Code stands out as a recommended standard. It's known for its advanced security features, support for refresh tokens, reduced exposure of credentials, and adaptability for both server-side and front-end applications.
Featured Post

DBA, The Key to Improving Security and CX Without Compromise

Today's consumers demand Amazon-like digital banking experiences. However, striking the right balance between customer experience and security remains an arduous challenge for banks. A consequence of user-driven authentication mechanisms is that a better customer experience usually comes at the expense of robust security measures. Contributing to the challenge is the fact that the majority of banks today rely on user-driven customer identity and access management (CIAM) systems. This requires customers to provide information each time verification is needed.