Systems | Development | Analytics | API | Testing

Enabling Oracle SSL/TLS Encryption

In our previous post on securing Oracle applications, we discussed how to enable Oracle Native Network Encryption for your client and server. In the conclusion however, we noted some of the shortcomings of using that security mechanism (potential for man-in-the-middle attacks, inability to control secure certificates, etc.). Here we begin to address those issues by instead enabling SSL/TLS encryption between the Oracle client and database.

3 Ways to Protect Your APIs With Kong Konnect and Fastly (Signal Sciences)

Fastly’s next-gen WAF (formerly Signal Sciences) integrates with Kong Konnect to block malicious requests to your services. Kong Gateway provides a robust and secure enterprise API management platform to front web traffic. In partnership, Fastly focuses on Layer 7 application security for that traffic. This article will explain how Kong Konnect and Fastly work together.

Converting HBase ACLs to Ranger policies

CDP is using Apache Ranger for data security management. If you wish to utilize Ranger to have a centralized security administration, HBase ACLs need to be migrated to policies. This can be done via the Ranger webUI, accessible from Cloudera Manager. But first, let’s take a quick overview of HBase method for access control.

Using Identity Management To Make Zero-Trust Security a Reality

Large-scale, sophisticated attacks like the SolarWinds cyber intrusion and the Microsoft Exchange Server hack are disturbing, to say the least. These are more than just bad headlines; they reflect fundamental, systemic problems with the security postures in most enterprises. One underreported issue is the continued adherence of organizations to principles that maintain strong perimeter controls to prevent things outside from coming in.

HDFS Data Encryption at Rest on Cloudera Data Platform

Encryption of Data at Rest is a highly desirable or sometimes mandatory requirement for data platforms in a range of industry verticals including HealthCare, Financial & Government organizations. The capability increases security and protects sensitive data from various kinds of attack that could be internal or external to the platform.

Configuring a PingFederate SAML Connection in DreamFactory

All DreamFactory APIs are private by default, requiring at a minimum an API key for authentication purposes. The API key is associated with role-based access control (RBAC) which determines what actions the client responsible for supplying the API key can undertake with regards to the API. OAuth 2.0 makes adding an authentication system to your app or web page considerably easy. Many different service providers support the OAuth 2.0 spec and, in turn, so does DreamFactory.

Node.js's Underrated Combo: Passport and CASL

It’s easy to get lost with dozens of plugins and frameworks when starting a new project that requires basic authentication and authorization capabilities. It doesn’t have to be that way. In this article, we’re going to explore two valuable Node.js packages — Passport and CASL — that can help you boost the security of your application by providing both authentication and authorization functionality.

Construction feat. TF2 Object Detection API

Although the title might sound like a collaboration of two music bands with really bad names, this blog is all about understanding how computer vision and machine learning can be used to improve safety and security in a harsh and dangerous environment of a construction site. The construction industry is one of the most dangerous industries according to the common stats from OSHA.

Enabling Oracle Native Network Encryption

Network encryption is a vital security step in hardening your application and guarding your data. Additionally, it is more often becoming a requirement by many organizations and laws such as HIPAA. In this article, we will discuss how to secure network communication between your application and the Oracle database using Oracle Native Network Encryption. We will demonstrate how encryption can be enabled and leveraged from SourcePro DB with no source code changes to your application.