Systems | Development | Analytics | API | Testing

Security

Interview With Cyber Security Author Scott Steinburg

For our first specialist interview on the Logit.io blog, we’ve welcomed Scott Steinburg to share his thoughts on the current state of cybersecurity as well as the reasons behind writing his new book Cybersecurity: The Expert Guide. Scott is the creator of the popular Business Expert’s Guidebook series, host of video show Business Expert: Small Business Hints, Tips and Advice and CEO of high-tech consulting firm TechSavvy Global.

Avoiding npm substitution attacks using NCM

NodeSource is excited to announce its latest NodeSource Certified Modules - NCM - release. NCM, provides developers and software teams with actionable insights into the risk levels that are present in your use of third-party packages. This release includes updates to avoid npm substitution attacks and also a GitHub Integration: Code risk, compliance and security action for PRs on Node.js.

ETLG: ETL for Data Governance and Better Security

Most enterprises are leveraging vast reserves of data to improve their business insights and decision-making. However, as companies manage larger stores of data and move more and more information from operational databases to data warehouses, it creates an ever-mounting threat of data breaches.

Will Data Privacy drive an Enterprise Data Strategy?

Data privacy is an increasingly complex and contentious topic. The appropriate use of data and transparency to the potential uses of the data are at the center of debate amongst the largest Big Tech companies. The protection and controls around data become increasingly complex when used in the context of banking and insurance activities. Personal and confidential information carries heightened sensitivity in the light of financial, health and insurance activities.

Authorizing Microservice APIs With OPA and Kuma

Many companies are leveraging DevOps, microservices, automation, self-service, cloud and CI/CD pipelines. These megatrends are changing how companies are building and running software. One thing that often slips through the cracks is security. With microservices, there’s an increase in the number of APIs companies have to protect. YouTube An error occurred. Try watching this video on www.youtube.com, or enable JavaScript if it is disabled in your browser.

DevSecOps Checklist for Reliable, Automated Software Security

The purpose of a DevSecOps checklist is not to list every single action and practice you should take to ensure that DevSecOps pipeline is effective. Rather, the purpose is to help you establish the right sort of DevSecOps mindset. DevSecOps is more than a collection of best practices, it’s a shared mindset that security is the responsibility of everyone on your team.

4 Steps to Authorizing Services With the Kong Gateway OAuth2 Plugin

In this tutorial, I’m going to walk through adding OAuth2 authorization and authentication to your service with the Kong Gateway OAuth2 plugin. First, I’ll cover the fundamentals. If you’re already familiar with how Kong Gateway and OAuth2 work, skip ahead to the tutorial. Interconnected. Shared. That’s the norm for today’s applications, networks and data.