Systems | Development | Analytics | API | Testing

Balancing Innovation and Security With Automation

Automating digital transformation API deployments can help speed time to market and minimize the resources required for the deployments — if developers can be assured that the automated process meets all necessary security requirements. It’s a topic that Kong Senior CustomerExperience Manager Peggy Guyott and Kong Senior Solutions Engineer Ned Harris discussed on a recent webinar as part of the Destination: Automation 2021 digital event.

Authentication and Authorization for RESTful APIs: Steps to Getting Started

Why do APIs require authentication in the first place? Users don't always need keys for read-only APIs. However, most commercial APIs require permission via API keys or other ways. Users might make an unlimited number of API calls without needing to register if your API had no security. Allowing limitless requests would make it impossible to develop a business structure for your API. Furthermore, without authentication, it would be difficult to link requests to individual user data.

How To Setup an SSH Tunnel Connection

In this video, we will set up an SSH tunnel connection within Xplenty to access a server on a private network. When configuring SSH tunnels for connecting to databases, authentication is performed using the SSH server. This can be done via either user name and password authentication or by using key-based authentication. Key-based authentication gives the user the ability to log in without a password.

Interview with Cybersecurity Specialist Charles Denyer

For our latest specialist interview in our series speaking to technology leaders from around the world, we’ve welcomed Charles Denyer. Charles is an Austin-based cybersecurity and national security expert who has worked with hundreds of US and international organizations. He is a founding member and senior partner in two consulting and compliance firms.

Interview with Lia Edwards

In the latest instalment of our interviews speaking to leaders throughout the world of tech, we’ve welcomed Lia Edwards. Lia leads the consultancy side of Threat Protect’s service offering having operated as CIO for several multinational corporations, including Fresnel before co-founding Threat Protect, where she provides consultancy and support on compliance and audit projects, working with clients such as KPMG among others.

How to Develop a Cloud Native Infrastructure

More and more companies are eager to move their operations to the cloud. Yet, there’s quite a bit of ambiguity on what moving to the cloud actually means. Is your business running in the cloud while you host your database on another platform or while you rely on a third-party service to handle your payments? That’s a good start for moving to the cloud, but there are many other aspects to consider when building a cloud native infrastructure.

Fixing Ransomware First Requires That We Fix Security

Ransomware has become a familiar front page news topic thanks to recent high-profile attacks against a major meat producer and an East Coast operator of a critical oil pipeline. Also, consider the attack on a provider of software tools to IT outsourcing shops that let hackers paralyze hundreds of businesses on all five continents. No doubt the ransomware threat is serious, and now Washington is mobilizing to wipe out a scourge it formerly treated only as a criminal nuisance.