Systems | Development | Analytics | API | Testing

Security

API Security In an Agile World: Here's What You Need to Know

The rise of web services creates many challenges that companies must address to avoid data breaches. Companies are embracing the power of APIs to extend their business capabilities. However, they began adopting them so quickly, security didn’t get as much attention as it deserved. Many organizations are now taking a strong look at API security to avoid being the next victim of a data breach. Here’s our take on security and what you can do to address it in your company.

A Guide to Secure Elixir Package Updates

Keeping your dependencies up-to-date is essential to ensure that your applications stay healthy, secure, and performant. Thankfully, the BEAM ecosystem has its own package manager, Hex, which is fast, mature, and simple to use. This article explores the available tools and commands to manage Hex dependencies and some tips to make the process more enjoyable. Let's dive in!

What the heck is DPoP? | IAM Community Meetups - 2022

An Application-level proof-of-possession protections for access and refresh tokens. DPoP (Demonstrating-Proof-of-Possession) is an additional security mechanism for the token generation which overcomes the issue of bearer token which will not validate between who is requested token and who is actually using the token for the access of a particular resource. In DPoP, this will be avoided by validating the client who requested the token is the one who is actually using the token using the Signed JWT tokens known as DPoP Proof.

The Importance of Compliance Risk Assessments

In a world that’s literally had to define a new normal, standards and rules around safety and quality have been scrutinized more than ever before. And that new reality is affecting standard operations for some industries. While the importance of compliance has not changed, the complexity of it may have. Considering how quickly we continue advancing, this increasing complexity may also be part of our new normal. If you’ve not updated your compliance management lately, now may be a good time.

Monitoring Appian with Appian: Automating Threat Analysis and Information Gathering

In our previous blog posts covering our in-house Security Orchestration, Automation & Response (SOAR) application, we described the basic building blocks for the system and the steps we took to orchestrate interactions between a number of security tools. While building orchestration, we already introduced a significant amount of Automation powering features like threat intelligence collection and event polling.

Playing Offense Against Ransomware with a Modern Data Infrastructure

Has your company faced a ransomware attack yet? If not, count yourself lucky, for now. A June 2021 article in Cybersecurity Ventures predicts that ransomware will cost its victims approximately $265 billion annually by 2031. And, according to CRN, “Victims of the 10 biggest cyber and ransomware attacks of 2021 were hit with ransom demands totaling nearly $320 million.”

SCA Automotive With the Power of Perforce

What is static code analysis like for automotive with the Power of Perforce? Find out! Perforce static code analysis tools — Helix QAC and Klocwork — have been trusted for over 30 years by global leaders in safety-critical industries — such as automotive, medical device, rail, aerospace, and defense — for their high accuracy and ability to quickly meet rigorous compliance requirements. Perforce SAST is known for compliance and application safety because the tools are certified for functional safety compliance by TÜV-SÜD, including ISO 26262, IEC 61508, EN 50128, IEC 60880, and IEC 62304.