Systems | Development | Analytics | API | Testing

Security

Using Identity Management To Make Zero-Trust Security a Reality

Large-scale, sophisticated attacks like the SolarWinds cyber intrusion and the Microsoft Exchange Server hack are disturbing, to say the least. These are more than just bad headlines; they reflect fundamental, systemic problems with the security postures in most enterprises. One underreported issue is the continued adherence of organizations to principles that maintain strong perimeter controls to prevent things outside from coming in.

HDFS Data Encryption at Rest on Cloudera Data Platform

Encryption of Data at Rest is a highly desirable or sometimes mandatory requirement for data platforms in a range of industry verticals including HealthCare, Financial & Government organizations. The capability increases security and protects sensitive data from various kinds of attack that could be internal or external to the platform.

Configuring a PingFederate SAML Connection in DreamFactory

All DreamFactory APIs are private by default, requiring at a minimum an API key for authentication purposes. The API key is associated with role-based access control (RBAC) which determines what actions the client responsible for supplying the API key can undertake with regards to the API. OAuth 2.0 makes adding an authentication system to your app or web page considerably easy. Many different service providers support the OAuth 2.0 spec and, in turn, so does DreamFactory.

Node.js's Underrated Combo: Passport and CASL

It’s easy to get lost with dozens of plugins and frameworks when starting a new project that requires basic authentication and authorization capabilities. It doesn’t have to be that way. In this article, we’re going to explore two valuable Node.js packages — Passport and CASL — that can help you boost the security of your application by providing both authentication and authorization functionality.

Construction feat. TF2 Object Detection API

Although the title might sound like a collaboration of two music bands with really bad names, this blog is all about understanding how computer vision and machine learning can be used to improve safety and security in a harsh and dangerous environment of a construction site. The construction industry is one of the most dangerous industries according to the common stats from OSHA.

Enabling Oracle Native Network Encryption

Network encryption is a vital security step in hardening your application and guarding your data. Additionally, it is more often becoming a requirement by many organizations and laws such as HIPAA. In this article, we will discuss how to secure network communication between your application and the Oracle database using Oracle Native Network Encryption. We will demonstrate how encryption can be enabled and leveraged from SourcePro DB with no source code changes to your application.

Xplenty PII & PHI transformations

Personally identifiable information (PII) and protected health information (PHI) are two types of sensitive data that fall under one or more data privacy regulations. HIPAA and GDPR are examples of the regulations that govern what organizations can and need to do with PII and PHI. When you work with large data sets, it can be challenging to maintain compliance with these regulations.

Getting Started with Kong Mesh and Open Policy Agent

In Kong Mesh 1.2, we added a number of new features to help enterprises accelerate their service mesh adoption. One of the major new features was native Open Policy Agent (OPA) support within the product. In the demo image above, you can see a number actions taking place across a simple web application. These “actions” ultimately are various GET, POST, and DELETE methods (API calls) across various tiers of our microservice application.

Governing API Management and Connectivity

As organizations adopt an API-first approach, there are many connectivity patterns to consider, and the developer experience needs to be excellent to promote adoption. It can be challenging to enforce API governance while enabling developers to build applications. This session recording covers how an organization can empower developers to use Kong securely, enable access control to the Kong API and Manager, enforce authentication/authorization in applications, and implement a zero-trust security model.