Systems | Development | Analytics | API | Testing

Cybersecurity: A Big Data Problem

Information technology has been at the heart of governments around the world, enabling them to deliver vital citizen services, such as healthcare, transportation, employment, and national security. All of these functions rest on technology and share a valuable commodity: data. Data is produced and consumed in ever-increasing amounts and therefore must be protected. After all, we believe everything that we see on our computer screens to be true, don’t we?

Using Kafka Connect Securely in the Cloudera Data Platform

In this post I will demonstrate how Kafka Connect is integrated in the Cloudera Data Platform (CDP), allowing users to manage and monitor their connectors in Streams Messaging Manager while also touching on security features such as role-based access control and sensitive information handling. If you are a developer moving data in or out of Kafka, an administrator, or a security expert this post is for you. But before I introduce the nitty-gritty first let’s start with the basics.

Is Fortify Static Code Analyzer the Right Choice for Your Next SAST Tool?

There are many embedded systems out there, but only a few static code analysis tools that realistically support embedded software developers. The recent acquisition of Micro Focus by OpenText, including the Fortify Static Code Analyzer, reignites the question of which static code analysis tool is best for your embedded software project. Between Fortify and Klocwork, our experts have the answer.

CIAM: Codifying the ever-changing keys to B2B commerce

WSO2 recently announced the release of their Private CIAM Cloud service, and it made me think about the changing role of personal identity versus business entity in today’s complex distributed software environments. The CIAM space has evolved far beyond the traditional end user’s need for identity and access to applications in a B2C (business to customer) scenario.

Security Best Practices for Your Rails Application

Alongside performance and usability, you should always focus on security when creating any web application. Keep in mind that hacking techniques are constantly evolving, just as fast as technology is. So you must know how to secure your users and their data. This article will show you how to create a secure Rails application. The framework is known to be secure by default, but the default configuration is not enough to let you sleep well at night.

Securing Your APIs With the Right API Management Solution

In today’s digital business landscape, APIs have become the most important digital asset. One study found that 83% of all internet traffic belongs to API-based services. APIs act as the reusable building block that employees, partners, and customers can easily access from anywhere. Figure 1: API security overview This has also made APIs the top security challenge for most companies. In a recent survey, about 94% of respondents noted that they had faced an API security issue over the past year.

Simplify Data Access Control | infoSecur

In this episode of “Powered by Snowflake” host Daniel Myers sits down with infoSecur’s Founder and CEO, Michael Magalsky. infoSecur is a centralized tool, used across all structured data environments and database sources to manage data policies and access down to the cell level across your data cloud. The “Powered by Snowflake" video series features conversations with technology leaders who are building businesses and applications on top of Snowflake.