Systems | Development | Analytics | API | Testing

Security

Tales Of Engineering Leadership: Lessons Learned Growing A Team Of 1 To 150 At Snyk

In this webinar, Liran Haimovitch, Rookout’s CTO, hosts Anton Drukh, formerly VP Engineering of Snyk and GM Israel and now an engineering leadership consultant, to discuss how Anton scaled engineering at Snyk from 1 to 150 (!) and what he learned along the way, including what decisions supported their rapid growth and what mistakes were made that you can now avoid.

Securing a Multitenant Database API with DreamFactory

SaaS applications generally tend to manage customer data in a multitenant database, meaning all customers share the same database. The data is secured, or segmented, by a unique identifier that maps a particular table record to a customer. This approach to data management means the SaaS can avoid the overhead and complexity of managing customer data within separate databases. Increasingly, SaaS customers are asking for API-based access to their data.

SFTP to Salesforce - Guide to a Secure Integration

Organizations have numerous departments and employees of all skill sets using the same CRM. When it comes to Salesforce, transferring data and files from an external location can be complicated, especially when dealing with confidential information. A great solution to securing the data transfer is to use an SFTP. Here is a step-by-step guide on how to integrate your systems from SFTP to Salesforce.

Klocwork 2021.2 Launches JavaScript Analysis Engine

The latest release of Klocwork features the launch of JavaScript, which greatly enhances the static analysis and SAST tool’s offerings. In addition, the release includes a number of other significant improvements that greatly enhance the tool’s performance and functionality. Here, we provide an overview of the new analysis engine.

The Top 14 Free and Open Source SIEM Tools For 2021

Security Information and Event Management (SIEM) is a combination of Security Information Management (SIM) and Security Event Management (SEM). A SIEM solution provides real-time analysis of security alerts generated by applications and networks. SIM is the collection, monitoring and analysis of security-related data such as log files into a central repository for trend analysis.

5 Reasons You Should Mask PII

If personally identifiable information (PII) falls into the wrong hands, it could have devastating consequences for both you and the affected individuals. But what if you could transform that information so that it would be useless to any attacker? That’s exactly what PII masking seeks to do. So what is PII data masking exactly, and how does PII masking help safeguard your sensitive and confidential information from PII data breaches? Keep reading for all the answers.

JWT Authentication: When and How To Use It

JWT stands for JSON Web Token, is a famous technology that comes with its own controversy. Few people find it quite beneficial, while others feel one must never use it. Nonetheless, in this article, we shall discuss the reason behind this controversy, understand JWT in detail, and when and why one must use it. We'll cover the following section in this blog. JWT (JSON Web Token) authentication is a process or method used to verify the owner of JSON data.

Interview With Cybersecurity Expert Tom Kirkham

For our latest expert interview on our blog, we’ve welcomed cybersecurity specialist Tom Kirkham to share his wealth of experience on the topic of cybersecurity. Tom is the founder and CEO of IronTech Security, a managed security service provider (MSSP) that focuses on educating and encouraging law firms, court systems, water utilities, and financial firms to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks.

PII Pseudonymization: Explained in Plain English

Data processors handle an abundance of data — including personal information about individuals. As the collection and use of data become more widespread, governments continue to enact laws that protect personally identifiable information (PII). Failing to comply with such laws means risking serious fines and penalties, and damaging public trust. Masking PII through pseudonymization is one way to protect it.

Privacy & Security Rules for Healthcare Marketers

Marketing is more complex if you're engaged in the healthcare field. Whether you work with patients or market to consumers interested in healthcare products, it's important to understand HIPAA guidelines. This article explains the basics of HIPAA Privacy and Security Rules, and how this legislation affects your marketing strategy.