Systems | Development | Analytics | API | Testing

Security

Defending your customer's data - René Waslo

This episode features an interview with René Waslo, Risk and Financial Advisory Principal at Deloitte & Touche. She works as a cyber professional within the Energy, Resources and Industrials sector. In this episode, René talks about zero trust, trends in security breaches, sustainability in cyber, and encouraging women to enter the cyber industry.

How to Build AWS Lambdas with TypeScript

Serverless computing is an exciting alternative to hosting apps on the AWS cloud. In this four-part series, we’ll run through how to build AWS Lambdas with TypeScript, improve the dev experience, optimize it, and finally, use AWS Cognito for security. In this take, I would like to take you on a journey to explore AWS Lambdas using TypeScript. We will build a pizza API, use Claudia to help deploy the app, and use the AWS CLI tool to set up a DynamoDB database.

National Cybersecurity Update: What's In the Latest US Presidential Executive Order

The U.S. Presidential Executive Order (EO) 14028 on Improving the Nation’s Cybersecurity was signed on May 12, 2021. The EO charges multiple agencies with enhancing cybersecurity through a variety of initiatives related to the security and integrity of the software supply chain.

Secure Your Node.js App with JSON Web Tokens

A JSON Web Token (JWT) is an open standard (RFC 7519) that securely sends and receives data between parties (in the form of a JSON object). In this article, we’ll implement JWT authentication to secure a Node.js application. We’ll also find out what JWT is all about and build a demo app. Let's get going!

Guide to Defense in Depth Security

Security best practices remain a top priority for enterprises, especially as high-profile hacks and cybersecurity breaches pose increased risks. According to the 2022 Morgan Stanley CIO survey, IT spending is expected to reach 4.4%, with cloud computing and security software as the leading verticals. This rapid digital transformation across sectors presents organizations with opportunities, along with some new challenges.

What is the Difference Between Data Compliance and Data Privacy?

When deploying any application that holds customer or user data, both data compliance and data privacy are important areas to consider. Yet these two areas of data management are sometimes misunderstood. This blog post will shed some light on the differences between data compliance and data privacy.

Rolling NIST's Cybersecurity Framework into Action

Data backup is the last line of defense when a cyberattack occurs, especially when the attack is ransomware. With robust data backup technologies and procedures, an organization can return to a point-in-time prior to the attack and return to operations relatively quickly. But as data volumes continue to explode, ransomware attacks are growing more sophisticated and beginning to target that precious backup data and administrator functions.

Bugfender is ISO 27001 certified! Here's why it's big news for you

Many companies tell you that “the security of our customers’ data is very important to us” in their marketing communications. And you believe them, for a while. But then you discover they were hacked with an open FTP server, using a password like “nameOfTheCompany2022”, and you realise that it’s not that important after all. Why do we mention this, you ask? Well, a few months ago Bugfender got ISO 27001-certified.

Secure Your WSO2 Micro Integrator Deployment

This article is about how to secure WSO2 Micro Integrator on microservices integration deployment. It describes how to use keystores, secure vaults, and more. WSO2 Micro Integrator is an integration solution widely used in enterprise integration. You can use WSO2 Micro Integrator to implement mediation policies, message transformation, security, and more. In this article, let’s focus on how you can securely place WSO2 Micro Integrator on your deployment.