Systems | Development | Analytics | API | Testing

CrowdStrike Security Failure: A Security Testing Update

Having strong security testing services are crucial, as demonstrated by the recent incident involving top cybersecurity service CrowdStrike, which rocked the industry. A global outage hurting companies, airlines, and government institutions throughout the globe was caused by a defective upgrade to their Falcon Sensor software. This terrible episode serves as a clear warning of the possible repercussions when security updates, intended to protect systems, contain undetected flaws.

Static Code Analysis With Katalon: A Complete Guide

In today's fast-paced software development environment, ensuring the quality and security of code is paramount. Static Code Analysis has emerged as a vital practice in this realm, offering a systematic method to examine code without the need to execute it. In this blog, you will delve into the essence of Static Code Analysis, its applicability, and the significant benefits it offers, particularly in the context of testing code.

Top 10 Tools for Monitoring OAuth Client Credentials Endpoints

When it comes to keeping your OAuth Client Credentials endpoints secure and high-performing, monitoring is crucial. Whether you’re a non-technical business owner, a software engineer, a student, a product owner, a web agency, or a DevOps professional, understanding and implementing effective monitoring can save you from a lot of headaches. In this article, we’ll dive into the top 10 best tools for monitoring OAuth endpoints, helping you find the best fit for your needs.

Opening the Door to Security Risk

Pushing your code to production without testing? You might want to think twice. In this episode, Bobby Dorlus, founder and CEO of #TheTechHustle, shares the importance of test automation, site reliability engineering, and his advocacy of diversity within the industry. Tune in as Jason and Bobby analyze the stats and real-life debacles that happen when testing gets skipped, as well as those who should be responsible for testing. Spoiler alert—it’s not just the developers.

Embedded Software Security for Industry 4.0 and the Internet of Things

Technology is booming now more than ever, and every day brings new products and functionality for every unimaginable task. It is not just about mobile apps and computers anymore; instead, it is all about embedded systems and Internet-of-Things (IoT) devices that have quickly become so commonplace, both in our day-to-day lives and in industries like industrial automation.

An Introduction to Auth0 for Ruby on Rails

From custom-made to plug-and-play forms of authentication, Ruby developers have plenty to choose from these days. Yet, as you may know, building your own solution can be costly and dangerous. If Devise is the de facto standard for most teams, an alternative might simplify the lives of most. This article will cover the setup and use of Auth0 in a Ruby on Rails application, including everything you need to get going properly, from handling roles to relying on multiple providers to authenticate users.

Introduction to WSO2 Identity Server 7.0 | an Overview

Welcome to the Introduction to WSO2 Identity Server 7! In this video, we'll guide you through the essential features and functionalities of WSO2 Identity Server, an open-source identity and access management (IAM) solution designed to help enterprises manage their digital identities securely and efficiently. Join us as we explore application integration, authentication options, user management, API authorization, and the powerful B2B capabilities offered by Identity Server 7.

Demonstrating Proof-of-Possession (DPoP): Preventing Illegal Access of APIs

In a previous blog post, we discussed the prevalence of bearer tokens (or access tokens) to restrict access to protected resources, the challenges the sheer nature of bearer tokens present, and available mitigations. To recap, presenting a bearer token is proof enough of an authorization grant to avail the service and access resources protected by the token. This poses many security risks such as using stolen or leaked tokens to gain unauthorized access.

Why Penetration Testing is Non-Negotiable in Today's Cybersecurity Landscape

Securing your software is essential in this day and age when cyber dangers may be found anywhere on the internet. Take a look at these concerning numbers: These numbers demonstrate the need for proactive security testing services like penetration testing, a.k.a. pen testing. Pen testing imitates real attacks on your applications to identify weaknesses before nefarious actors use them.

Creating a Secure SIMATIC PLC REST API Using DreamFactory

Organizations deploying Siemens SIMATIC PLCs (Programmable Logic Controllers) will logically want to track and manage PLC metrics. Exactly how these metrics are managed will depend upon the specific needs of the organization. For instance, organizations that would like to send PLC data directly to a Microsoft SQL Server database can use the TDS (Tabular Data Stream) protocol. But what if you wanted to subsequently access this data via a REST API?