Systems | Development | Analytics | API | Testing

Security

Security Reference Architecture Summary for Cloudera Data Platform

This blog will summarise the security architecture of a CDP Private Cloud Base cluster. The architecture reflects the four pillars of security engineering best practice, Perimeter, Data, Access and Visibility. The release of CDP Private Cloud Base has seen a number of significant enhancements to the security architecture including: Before diving into the technologies it is worth becoming familiar with the key security principle of a layered approach that facilitates defense in depth.

Why PII Pseudonymization is Crucial for Data Security

Data security is an important priority for every organization that handles customer or user data, especially those that fall under data privacy and protection laws such as the EU’s General Data Protection Regulation (GDPR). Large volumes of personal data flow in and out of companies and their systems every day, and the threat of data breaches looms over these operations. How can organizations use their data to power critical operations without running afoul of regulations or privacy concerns?

Monitoring Appian with Appian: Orchestrating the Security Toolbox

In our previous blog post covering our in-house Security Orchestration, Automation & Response (SOAR) application, we described the data model for the system and basic features allowing security analysts to review events and trends across Appian’s many security monitoring systems.

Securing your Applications in Node.js - Part 2/3

If you haven’t checked out the first part of Securing your Applications in Node.js, click here. This is a 3-part blog series on Node.js. This article aims to establish a Node.js security roadmap by addressing security challenges comprehensively and consistently for large infrastructures. Let’s begin! 🚀

How to Choose the Best API Management Platform

An API or Application Programming Interface is how two applications communicate with one another; it is also the way users access an application. All websites and applications use some form of API through an API gateway, which serves as an entry point to a service. Unfortunately, over 90% of businesses have suffered from a security problem related to their APIs, making API security a top concern. For this reason and more, many businesses require a dedicated API management platform.

Security Risks On Rails: Misconfiguration and Unsafe Integrations

In the third and final article of our series on the OWASP Top 10 Web Application Security Risks, we’ll explore the lesser-known risks associated with the development of web applications on Rails when it comes to threats involving security misconfiguration, JSON escaping, etc.

Web Security Attacks You Must Know - Part 2

The world is a digital place today. We fulfil most of our work, social and family tasks virtually, using the internet. The technology is now so universal, with so few barriers to entry, that practically anyone can connect to this global grid, no matter their technical skills. However, there is a flip side. Many people lack security awareness and knowledge, which can have drastic impacts on their social and financial life.