Systems | Development | Analytics | API | Testing

Security

Demo: Zero Trust Security with Service Mesh

As the number of microservices increases and deployed across private and public networks, security is critical. Leveraging a Service Mesh guarantees the security of applications and services without burdening developers to build security, freeing them to focus on business logic and allowing organizations to meet and prove their compliance and security requirements. TIMECODES #ZeroTrust #ServiceMesh #mtls #OPA #KongMesh #KongSummit

Sentry to Ranger - A Concise Guide

Cloudera Data Platform (CDP) brings many improvements to customers by merging technologies from the two legacy platforms, Cloudera Enterprise Data Hub (CDH) and Hortonworks Data Platform (HDP). CDP includes new functionalities as well as superior alternatives to some previously existing functionalities in security and governance. One such major change for CDH users is the replacement of Sentry with Ranger for authorization and access control.

Protecting Australian Consumer Data Rights (CDR) with Kong Gateway

This post highlights how you could use Kong Gateway to implement a solution for the Australian Consumer Data Standards (CDS), which is part of the Consumer Data Right legislation introduced by the Australian Government in November 2017. As detailed on the Australian ACCC website: CDR will give consumers greater access to and control over their data and will improve consumers’ ability to compare and switch between products and services.

Cloudera Addresses Executive Order on Improving U.S. Cybersecurity with Data Analytics

SANTA CLARA, Calif., Nov. 9, 2021 – Cloudera, the enterprise data cloud company, today announced Cloudera Data Platform capabilities available to help federal agencies meet requirements of the Biden Administration’s Executive Order on improving the Nation’s cybersecurity. Cloudera is committed to supporting the federal government in adhering to this executive order with the company’s technology and special government rates.

SOC2 Certification

Speedscale Inc. has achieved SOC 2 Type I compliance in accordance with American Institute of Certified Public Accountants (AICPA) standards for SOC for Service Organizations also known as SSAE 18. Achieving this standard with an unqualified opinion serves as third-party industry validation that Speedscale Inc. provides enterprise-level security for customer’s data secured in the Speedscale Inc. System. Speedscale Inc.

Top DevSecOps Tools For 2022

DevSecOps combines the responsibilities of development, security and operations in order to make everyone accountable for security in line with the ongoing activities conducted by development and operations teams. DevSecOps tools serve to assist the user in minimising risk as part of the development process and also support security teams by allowing them to observe the security implications of code in production.

Best practices for securing your applications and APIs using Apigee

Enterprises across the globe are seeing surging demand for digital experiences from their customers, employees, and partners. For many of these enterprises, hundreds of business applications are hosted in private or public clouds that interact with their users (customers, partners, and employees) spread across geographies, channels (web, mobile, APIs, VPNs, and cloud services), and time zones.

Tales of Engineering Leadership: Lessons Learned Growing a Team of 1 to 150 at Snyk

What does it take to be a successful engineering manager? What does it take to scale and grow your team and your people - and what should you avoid doing at all costs? In this webinar, Liran Haimovitch, Rookout’s CTO, will host Anton Drukh, formerly VP Engineering of Snyk and GM Israel and now an engineering leadership consultant, to discuss how Anton scaled engineering at Snyk from 1 to 150 (!) and what he learned along the way, including what decisions supported their rapid growth and what mistakes were made that you can now avoid.