Serverless computing is an exciting alternative to hosting apps on the AWS cloud. In this four-part series, we’ll run through how to build AWS Lambdas with TypeScript, improve the dev experience, optimize it, and finally, use AWS Cognito for security. In this take, I would like to take you on a journey to explore AWS Lambdas using TypeScript. We will build a pizza API, use Claudia to help deploy the app, and use the AWS CLI tool to set up a DynamoDB database.
A JSON Web Token (JWT) is an open standard (RFC 7519) that securely sends and receives data between parties (in the form of a JSON object). In this article, we’ll implement JWT authentication to secure a Node.js application. We’ll also find out what JWT is all about and build a demo app. Let's get going!
Security best practices remain a top priority for enterprises, especially as high-profile hacks and cybersecurity breaches pose increased risks. According to the 2022 Morgan Stanley CIO survey, IT spending is expected to reach 4.4%, with cloud computing and security software as the leading verticals. This rapid digital transformation across sectors presents organizations with opportunities, along with some new challenges.
When deploying any application that holds customer or user data, both data compliance and data privacy are important areas to consider. Yet these two areas of data management are sometimes misunderstood. This blog post will shed some light on the differences between data compliance and data privacy.
Data backup is the last line of defense when a cyberattack occurs, especially when the attack is ransomware. With robust data backup technologies and procedures, an organization can return to a point-in-time prior to the attack and return to operations relatively quickly. But as data volumes continue to explode, ransomware attacks are growing more sophisticated and beginning to target that precious backup data and administrator functions.
You may have used OAuth before, but do you know how it really works? In this article, Mauro Chojrin dives deep into building an end-to-end OAuth implementation in PHP.
Many companies tell you that “the security of our customers’ data is very important to us” in their marketing communications. And you believe them, for a while. But then you discover they were hacked with an open FTP server, using a password like “nameOfTheCompany2022”, and you realise that it’s not that important after all. Why do we mention this, you ask? Well, a few months ago Bugfender got ISO 27001-certified.
This article is about how to secure WSO2 Micro Integrator on microservices integration deployment. It describes how to use keystores, secure vaults, and more. WSO2 Micro Integrator is an integration solution widely used in enterprise integration. You can use WSO2 Micro Integrator to implement mediation policies, message transformation, security, and more. In this article, let’s focus on how you can securely place WSO2 Micro Integrator on your deployment.