Systems | Development | Analytics | API | Testing

What is Data Security? - The Role of Analytics in Data Protection

Data security (or data protection) is a term often used in the context of analytics and business intelligence (BI). It encompasses a number of different policies, processes and technologies that protect an company's cyber assets against data breaches and threats. But what does all of that really mean, in relation to BI specifically?

Managing Kuma Tokens with HashiCorp Vault

Managing tokens in Kuma can be a challenging and manual process. Both the user and dataplane token lifetimes need to be manually tracked and managed. This ultimately becomes a burden for DevOps, and long life tokens end up being used. In this session, you will learn how to: Kong Builders is a livestream series that takes our developer-focused toolsets and puts them on display in the best venue possible – building applications and connecting workloads.

Not All MFA is Created Equal, Especially in CIAM

Since October is cybersecurity awareness month, it’s a great time to revisit the question of what are the best ways to secure user authentication in CIAM. In many industries (finance and healthcare, to name a few), regulations require the use of multifactor authentication (MFA) to protect access to sensitive data and transactions.

Protect Your Assets and Your Reputation in the Cloud

A recent headline in Wired magazine read “Uber Hack’s Devastation Is Just Starting to Reveal Itself.” There is no corporation that wants that headline and the reputational damage and financial loss it may cause. In the case of Uber it was a relatively simple attack using an approach called Multi Factor Authentication (MFA) fatigue. This is when an attacker takes advantage of authentication systems that require account owners to approve a log in.

Preventing PII in Test environments

Data privacy and security are a top concern for most organizations. It’s easy to see why given changes over the past few years. These types of protections can be great for us as consumers. However, they also make it extremely difficult to create realistic production simulations in pre-production. It’s hard to rapidly develop new applications if you can’t iterate against realistic data.

6 Important Questions to Ask Before Choosing Your Web Host Provider

In this digital age, a company website is a sine qua non for most successful businesses. Your company website gives the ever-crucial first impression to your potential customers. Well, the experience your consumers will have will depend on the web hosting service you pick. A good web hosting provider will do heavy lifting for you. However, the plethora of reputable web hosting services in the market can make it hard to decide which one would best suit your company. It calls for careful research and consideration to select the best fit for your website.

Using OAuth2 to access Emails

OAuth 2.0 is becoming a popular alternative for application authentication. With Microsoft discontinuing Basic authentication and making OAuth 2.0 one of their new standards, many developers are sure to be in a situation where they need to change how they handle authentication for popular applications such as mailboxes, exchange services, and more. This article will briefly touch on OAuth 2.0, how it can be used, and an example of using it read mail from an Office 365 mailbox.

Surviving the API Security Apocalypse

With more and more businesses transforming themselves digitally, it has become critical to secure your APIs. An insecure API is an easy target for attackers to gain access to an otherwise secure computer or network. We invite you to learn about API security best practices to protect against cyberattacks, API misuse, data breaches, and zombie APIs.

Taming the Tech Stack: Leverage Your Existing Tech Stack Securely With an Analytics Layer

Analytics and data visualizations have the power to elevate a software product, making it a powerful tool that helps each user fulfill their mission more effectively. To stand apart from the competition, today’s software applications need to deliver a lot more than just transaction processing. They must also provide insights that help drive better decisions, alert users to matters that require their attention, and deliver up-to-the-minute information about the things that matter most.