Systems | Development | Analytics | API | Testing

Security

Featured Post

CIAM Beyond Access Management - Is Your CIAM Programme There Yet?

An important question to pose to the modern organisation is how mature is their Customer Identity and Access Management (CIAM) programme, and how do they plan to evolve it? Recently, we have seen a real desire from organisations to move beyond delivering the traditional CIAM requirements focused only on security to delivering a richer, more personalised experience for customers, across multiple touch points. In fact, 67% of the 200 UK and Ireland respondents who took part in a WSO2 and Vanson Bourne research study last year said they are utilising a CIAM platform. With this context in mind, it is a promising sign, therefore, that we have seen many existing and prospective CIAM customers seeing a fairly rapid evolution in maturity over the last year at WSO2.

What Is Application Security? AppSec + AppSec Tools Overview

Application Security (AppSec) is essential to efficient and effective security measures that help address rising security threats to software applications. Here we discuss the principles of Application Security (AppSec), the best practices to enforce it, and the AppSec tools you should use.

Data Privacy for Kids Apps: What Parents and Developers Need to Know

Do you ever notice how children have become more glued to gadgets than any generation before? Being highly exposed to digital experiences, including educational and entertainment applications comes with the need for more privacy protection for children's personal information.

Top Five Reasons Security Matters on Atlassian Marketplace

As an application development leader, you’ll want to continuously improve your team's processes and outcomes. The cloud marketplace has become a popular way for enterprises to buy software, but with the increasing amount of sensitive data being processed, stored, and transmitted in the cloud, security has become a critical concern for both cloud service providers and their customers.

5 Ways to Use Log Analytics and Telemetry Data for Fraud Prevention

As fraud continues to grow in prevalence, SecOps teams are increasingly investing in fraud prevention capabilities to protect themselves and their customers. One approach that’s proved reliable is the use of log analytics and telemetry data for fraud prevention. By collecting and analyzing data from various sources, including server logs, network traffic, and user behavior, enterprise SecOps teams can identify patterns and anomalies in real time that may indicate fraudulent activity.