Systems | Development | Analytics | API | Testing

Security

Interview with CISCO, Victor Kritakis

For the next interview in our series speaking to technology and IT leaders around the world, we’ve welcomed experienced CISCO Victor Kritakis, of Epignosis. As the head of the company’s information security policy, he is responsible for penetration testing and vulnerability assessments, staff cybersecurity training, administration of the bug bounty program, as well as maintaining the ISO 27001 certification standards.

Electric Vehicle Overview: Electric Vehicle Software

Currently, electric vehicles make up less than 1% of cars currently on the road, according to global business-focused news organization, Quartz. However, within the next decade that will rapidly change. By 2040, it is estimated that electric vehicles will make up roughly 33% of all cars on the road, according to a Bloomberg New Energy Finance study.

Token-Based Access Control With Kong, OPA and Curity

As APIs and microservices evolve, the architecture used to secure these resources must also mature. Utilizing a token-based architecture to protect APIs is a robust, secure and scalable approach, and it is also much safer than API keys or basic authentication. However, token-based architecture comes in varying maturity levels, as outlined by the API Security Maturity Model.

Two-Factor Authentication(2FA) using Speakeasy

Normally, you must submit a password in order to log into an application. In the case of two-factor authentication, you must also provide a one-time temporary password (also known as a token) in addition to your regular password. You can get this OTP in a variety of ways. The different varieties of 2FA are determined by how the OTP is provided. The OTP can be sent via email, SMS, as a software token using applications such as Google Authenticator, or as a hardware token.

An Ultimate Guide about SQL Injection for WordPress Users

The Structured Query Language (SQL) is a Relational Database Management System (RDBMS) that is pronounced like the word "sequel." It was the first simple way to store and retrieve many sorts of data on computer systems, and it was invented in 1974. Since then, the language has grown in popularity, and it is still used in many content management systems (CMS) today, such as WordPress.

IP Security Vulnerability Detection

The severity and ingenuity of cyberattacks continues to increase as malicious actors become more proficient, breaking through the software layers and aiming to also compromise hardware like integrated circuits. Relative to software, it is much more difficult to patch security vulnerabilities in ICs – making early identification of IP security weaknesses increasingly important.

How to Turn on Change Data Capture (CDC)

2.5 quintillion bytes of data are produced every day, and those numbers are continually increasing. With such astronomical volumes of data, businesses have to understand and interpret data faster than ever before. However, data transfers must occur for businesses with millions of data entry points to properly store and interpret their data.

Managing Secrets in a central location: Secret Envs filtering

We’ve just released (the first phase of) a new feature called Secret Envs filtering that enables managing secrets in a central location. Now you can set env vars as secrets from within your Workflows, mask them, and with a Script Step, use secrets from an external vault/company’s own service.