Systems | Development | Analytics | API | Testing

Security

Keeping Your OS Security Up-To-Date

There are many factors to keep in mind when thinking about how to keep systems and applications secure. First and foremost is the actual environment where the application is deployed. The environment consists of the Operating System (OS), libraries included with the OS, and software that runs in the background. In a perfect world, an application would have very few or zero dependencies on the environment, thereby eliminating the need to keep dependencies up to date.

What Is Shift-Left Security?

In software development, shift left is a practice that helps developers find vulnerabilities and coding errors earlier in the software development process. Shift-left security is an efficient approach that focuses on security and helps address any security issues in code long before the software is released. Here, we provide an overview of what is shift-left security and offer guidance on how a static analyzer can help you uncover security vulnerabilities early in the SDLC.

Securing and Governing the Digital Double - Path to a Trusted Digital Ecosystem

Many of us now take our daily digital experiences for granted, whether it’s making a purchase, taking an exercise class, playing a game, or checking our bank accounts. Moreover, the lines between the physical and digital worlds have become increasingly blurred, and few people think twice about using mobile tickets to attend an event or checking a digital watch to track a workout. However, security has not kept pace with the demands of today’s digital ecosystems.

Ensuring Data Privacy in Product Analytics: Why Is It Important, and How To Do It?

In our previous Countly Digest, we delved into the top concern of product managers and analysts: tracking user behaviour. It is a crucial aspect of product analytics, as it enables companies to understand user behaviour and preferences, leading to better product development and increased revenue. ‍

Unleashing the Power of NCM: Safeguarding Node.js Applications with Next-Generation Security in N|Solid

In the world of Node.js, application development, speed, flexibility, and scalability are critical for modern software development. However, the risk of vulnerabilities and security breaches looms with the increasing reliance on open-source Node packages. NCM (NodeSource Certified Modules) is the next-generation security solution that empowers Node.js developers to safeguard their applications easily and confidently.

Secret rotation for Kafka Connect connectors with AWS Secret Manager

With version 5.1, Lenses is now offering enterprise support for our popular open-source Secret Provider to customers. In this blog, we’ll explain how secrets for Kafka Connect connectors can be safely protected using Secret Managers and walk you through configuring the Lenses S3 Sink Connector with the Lenses Secret Provider plugin and AWS Secret Manager.