Systems | Development | Analytics | API | Testing

Security

Understanding SOAP Security

Cybersecurity is one of the top concerns for businesses today. Vulnerabilities make the news when they turn into expensive breaches. With the cloud so prevalent in today’s digital landscape, much attention has turned to API security. Network attacks aimed at APIs increased by an incredible 681% in 2021. Considering the continued popularity of SOAP (simple object access protocol) APIs, it is now a top priority for global IT leaders to learn SOAP’s security best practices.

Enhancing Customer Experiences with CIAM

In a recent interview, David deBoisblanc, managing partner at Duczer East and a valued partner of WSO2, interviewed Geethika Cooray, vice president and general manager of IAM at WSO2, to gain insights into the importance of CIAM for the C-suite and its impact on customer retention. The following excerpts from their conversation look at valuable insights on CIAM, its significance for the C-suite, and the emerging trends in the industry. Here's what Geethika said.

API Security and Management: The Impact on the Fintech Industry

Greg Peranich and Tryn Brown contributed to this post. The world of financial services is driven by digital experiences. Over the last 20 years, virtually all banking activities have been taken online (an unfortunate change only for fans of pneumatic tubes and pens on beaded chains). Like other industries that have undergone digital transformation, financial institutions are leveraging APIs to give users a more seamless experience when managing their money.

How to Manage Risk with Modern Data Architectures

The recent failures of regional banks in the US, such as Silicon Valley Bank (SVB), Silvergate, Signature, and First Republic, were caused by multiple factors. To ensure the stability of the US financial system, the implementation of advanced liquidity risk models and stress testing using (MI/AI) could potentially serve as a protective measure.

Keep Your Ruby App Secure with Bundler

This article covers the use of bundler features to secure Ruby applications. In this day and age, we have to be more and more careful about software supply chain security. We'll show you how to start this journey by relying on a Gemfile and bundler to manage your project's dependencies. By the end of the post, you will better understand how bundler audit and bundler outdated work. Both can help you monitor the security state of your project's dependency tree. Let's dive in!

How Complying with MISRA Improves Safety in C++ Applications

At Perforce, we have a long history of supporting applications that need to be stable and secure. With over 50 years of application development experience, we have learned many things from our customers, trends, and our competitors. We have taken best practices from all areas of software development and attempted to apply those to everything we do. We adopted unit testing, automated testing, agile development, code reviews, continuous integration, and much more.

Cookieless authentication in ThoughtSpot Everywhere

Amidst growing concerns around user privacy and regulatory laws, the cookieless paradigm has been gaining momentum over time in digital advertising. In addition, web browsers are increasingly blocking third-party cookies altogether in web sessions, necessitating the need for new authentication methods in web applications. Cookieless authentication is a secure way to verify user identities in web applications without relying on cookies.

GraphQL API Authorization Strategy with Kong Konnect and Styra DAS

In this talk, Claudio Acquaviva (Senior Solution Architect at Kong) and Ádám Sándor (Solutions Architect at Styra) discuss how to leverage Kong Konnect API Gateway and Styra Declarative Authorization Service (DAS) to build Open Policy Agent (OPA) authorization policies for GraphQL APIs. You will first learn how to implement a GraphQL API at Kong Gateway with OPA, followed by diving into Styra DAS to provide an enterprise-ready policy management platform to build, test, and deploy authorization policies.