Systems | Development | Analytics | API | Testing

Security

The Complete Guide to Student Data Privacy

Are you handling students' education records or personally identifiable information (PII)? If so, it's crucial that you're familiar with what student privacy laws such as the Family Educational Rights and Privacy Act (FERPA) have to say. In this article, we'll go over what educators and administrators need to know about FERPA and student data privacy.

Rollbar Integrations: Okta

Integrate Okta with your Rollbar in 5 minutes or less! Save time on administration and increase security by bringing Okta’s world-class authentication and secure access management to your Rollbar account. Rollbar is the leading continuous code improvement platform that proactively discovers, predicts, and remediates errors with real-time AI-assisted workflows. With Rollbar, developers continually improve their code and constantly innovate rather than spending time monitoring, investigating, and debugging.

Okta and Kong Konnect Part 3: Implementing Introspection Flow

In our third Kong and Okta tutorial, we’ll go through the introspection flow implementation. The introspection flow is part of the token validation process. Kong Gateway evaluates the injected token at the request processing time to see if it's still valid to the upstream services. The evaluation hits a specific Okta endpoint, passing the received token. Based on the response provided by Okta, Kong Gateway accepts or rejects the request.

The Official 2021 Checklist for HIPAA Compliance

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a U.S. federal law. It sets national standards for health care providers to maintain the privacy of patients' protected health information (PHI), including electronically protected health information (ePHI). If you collect, store, or process any kind of patient or medical data, you need to be aware of HIPAA and how it affects your operations. But what does it really mean to be HIPAA compliant?

Tested Recipe for Optimizing and Securing Your Hybrid Cloud Environments

Enterprises are quickly evolving from a posture that approached the cloud as a kind of playground to one that goes all in to achieve cloud-first, cloud-native IT. With this transition from free-for-all to mature-business-service architecture, usually involving multiple public cloud providers, comes the need to answer some thorny questions. It’s no longer sufficient to endlessly pile on additional cloud services to a growing hybrid or distributed cloud infrastructure.

What is PII Masking and How Can You Use It?

Imposter fraud is the second-most common type of fraud reported to the Federal Trade Commission, with around one-fifth of all cases resulting in financial loss to the victim. This often occurs because of a failure on the part of organizations to protect personally identifiable information (PII). Fraud is only one type of attack that may occur. Phishing is another exceptionally common data security threat. It often results from crawlers collecting email addresses, one type of PII, on the open web.

A Guide to Data Privacy and Data Protection

Organizations collect and use personal data for a variety of purposes, often without considering the impact on data privacy. Individuals are increasingly more aware of how their data is being used and the lack of say they have over the process. Data privacy and protection regulations are in place around the world to protect consumers and stop their personal information from being misused.