Systems | Development | Analytics | API | Testing

Security

Magic link authentication using Asgardeo

Passwords are becoming obsolete, and the tech world is exploring various different technologies to allow users to log in without passwords. In a previous article, we discussed the perils of passwords and how FIDO2 can help us go passwordless. However, FIDO2 is no silver bullet as it comes with its fair share of caveats. Magic link is a viable alternative for all those who do not want to use FIDO2. This article discusses magic link in detail and demonstrates how we can use it with Asgardeo.

Scan your builds for vulnerabilities by using mobsfscan with Codemagic

With the increase in malware attacks on devices, engineers are putting more effort into ensuring the products they build are not vulnerable to these attacks. One such tool that can help mobile engineers reduce vulnerabilities is Mobile Security Framework (MobSF).

Predictions for the Future of Modern Data Authentication

Whether in the public fleet industry, telecommunications, or another sector that manages significant data sets, all companies need to ensure that they hold their data security to the highest standards. Many security features are still in their infancy, but the amount of information being stored and accessed daily has increased exponentially over the last few years. Thankfully the future of modern data authentication is bright.

Hunters Brings Data Integration to Security Operations

In this episode of “Powered by Snowflake,” Daniel Myers chats with Uri May, Co-founder and CEO of Hunters, a three-year old company that is bringing new levels of data integration to the world of network security operations. “Our differentiator,” May explains, “is that we want to seamlessly integrate as much data as possible. And that is something Snowflake facilitates very well because of its ability to scale, its performance, and even its business model of paying for storage and compute with different credits. We believe that more data means better efficacy, more accuracy, and faster detection times.”

Protecting Privacy While Enhancing Data Access Using the Snowflake Media Data Cloud

Increased regulatory scrutiny around data security has created a challenge for media companies, which need to protect consumer privacy while also finding ways to use the consumer data they’ve collected to enhance their advertising and marketing efforts and deliver a superior consumer experience. It can be a delicate balancing act. But those companies who have adopted the Snowflake Media Data Cloud report that it is a balancing act they can manage efficiently.

Snowflake's Newest Workload for the Data Cloud: Cybersecurity

Cybersecurity is a data problem at its core. Yet, security teams haven’t achieved tremendous success in utilizing the modern data stack that data analytics teams have enjoyed for years. Security teams face constant pressure from vulnerabilities and breaches in their infrastructure and supply chains because they remain on a proverbial island with antiquated technology. Cybersecurity leaders must uplevel their strategies by implementing a modern security data lake.

CIAM Responsible Solutions for Creating Positive Consumer Experiences - CIAM Trend Chat NA 2022

Consumers see the world as all digital with no divide. As a result, whether those consumers are young, old, digitally savvy, or technophobes; organizations are going to have to find a way to ‘deliver better customer interactions’ than their competitors if they are to acquire and retain them. Customer Identity and Access Management (CIAM) can be defined as “A customer-focused IAM discipline that facilitates leveraging identity data with business data to catalyze business growth”.

API Security: Tips and Practices to Keep Your System Safe

As more and more businesses move to API-driven architectures, the need for strong API security increases. If your business relies on APIs to connect different parts of your infrastructure, you need to make sure your APIs are adequately secured. This article will discuss API security best practices to protect your data.

Validate WSO2 API Manager gateway request with open policy agent

Open policy agent (OPA) enables you to write security and compliance policies as code, or call any external policies using the OPA standard. WSO2 API manager uses this capability to offload policy decisions of API gateway requests to this policy engine. By decoupling the policy enforcement from evaluation, API policymakers now have the opportunity to write dynamic and reusable policies for ever-changing requirements. You can then reuse an OPA policy like any other policy in the API Manager by graphically dragging and dropping it into a policy pipeline. This video explains how it works and gives a demo.