Systems | Development | Analytics | API | Testing

Security

Common Regulations that Data-Driven Entities Need to Know

For public and private entities, data collection is a way of life. That fact has led to the proliferation of common regulations to protect consumers and individuals from unacceptable use or storage of their private data. But it's not just data collection laws companies have to adhere to. There are many US-based and international statutes that put constraints on how they do business. What follows summarizes the most common regulations and how they can affect the work you do, day to day.

The Importance of Zero-Trust Security When Making the Microservices Move

Transitioning to microservices has many advantages for teams building large applications that must accelerate the pace of innovation, deployments and time to market. It also provides them the opportunity to secure their applications and services better than they did with monolithic codebases.

How to Comply with Sweden's PII Data Protection Act

Personal Identifiable Information (PII) has become a headache for most digital-first businesses in recent years. Everyone agrees we need rules to keep personal data safe, but there’s no universal PII Data Protection Act we can all follow. Instead, there is a worldwide patchwork of regulations, many of which have global implications. Sweden is one of the pioneers in data security laws.

How to Prevent and Respond to Data Breaches

Cybercriminals are currently enjoying a golden age. The sudden shift to remote working, combined with the digitization of everyday life, means endless opportunities to compromise systems and access sensitive data. If you don't want your organization to be their next victim, you must have to know how to prevent data breaches.

How to Safeguard Sensitive Data with Security Controls

According to the Ponemon Institutes, "Cost of a Data Breach" report, a data breach's total global cost averaged $3.86 million in 2020. However, a data breach's implications go far beyond financial losses; it can severely hinder an organization's operational capacity and compliance structures.

Lenses upgrade: powerful SQL, Connect multi-tenancy & message headers

We’re continuously releasing new capabilities to enable more people to be productive and compliant when working with Apache Kafka. Our engineers have been hard at work on a great Christmas present for our amazing community of Kafka users. Before unwrapping our latest and greatest release, here’s a sneak peak of what’s inside.

Data Security Threats and Compliance for 2021 and Beyond

Large and small businesses face daily reminders that their data’s security is under attack by digital pirates, hackers, and cybercriminals. These threats require an immediate response, whether it's an unexpected hacking threat or a newly discovered database vulnerability. In this guide, we’ll help you understand these threats and how to prevent them in 2021.

How to configure clients to connect to Apache Kafka Clusters securely - Part 2: LDAP

In the previous post, we talked about Kerberos authentication and explained how to configure a Kafka client to authenticate using Kerberos credentials. In this post we will look into how to configure a Kafka client to authenticate using LDAP, instead of Kerberos. We will not cover the server-side configuration in this article but will add some references to it when required to make the examples clearer.