Systems | Development | Analytics | API | Testing

DevSecOps Checklist for Reliable, Automated Software Security

The purpose of a DevSecOps checklist is not to list every single action and practice you should take to ensure that DevSecOps pipeline is effective. Rather, the purpose is to help you establish the right sort of DevSecOps mindset. DevSecOps is more than a collection of best practices, it’s a shared mindset that security is the responsibility of everyone on your team.

4 Steps to Authorizing Services With the Kong Gateway OAuth2 Plugin

In this tutorial, I’m going to walk through adding OAuth2 authorization and authentication to your service with the Kong Gateway OAuth2 plugin. First, I’ll cover the fundamentals. If you’re already familiar with how Kong Gateway and OAuth2 work, skip ahead to the tutorial. Interconnected. Shared. That’s the norm for today’s applications, networks and data.

Your guide to SSL certificates as an online customer

We’re all familiar with the internet, especially since we use it to do almost all of our daily activities. Since the days of that familiar buzzing noise of AOL dial-up as it connected to somewhere out there in the stratosphere, we’ve been hooked on the internet and its vast space that holds endless amounts of information, ready for us to tap into right at our fingertips.

Protecting Personal Data: GDPR, CCPA, and the Role of ETL

The growth of data has been exponential. By 2023, it's anticipated that approximately 463 exabytes (EB) will be created every day. To put this into perspective, one exabyte is a unit equivalent to 1 billion gigabytes. By 2021, 320 billion emails will be sent daily, many of which contain personal information. Data collected around the globe contains the type of information that businesses leverage to make more informed decisions.

Getting Started With Kong's OpenID Connect Plugin

The concept of zero-trust security is relatively simple. In essence, no entity or system should have trust by default. You should assume that any system you are talking to is not trustworthy until you establish otherwise. Within Kong Konnect, one mechanism to apply zero-trust is the OpenID Connect API gateway plugin. In this post and the below recording from our recent Destination: Zero-Trust virtual event, I’ll cover OpenID at a high level and some of its applications and use cases.

What Is Metasploit?

In this quick guide for cybersecurity professionals, we’ve invited some of our favourite security experts who have previously worked with Metasploit to explain why this tool is so valuable for conducting effective penetration tests and network reconnaissance tasks. Our first expert Michael Roninson, Security Expert at Cerber Tech gives a brief overview of this tool and how to use it in his response below;

How can DataOps improve your financial institution's fraud program and mitigate risks?

Fraud comes in different forms, from client-facing credit card fraud to internal fraudsters twisting the loan portfolio. Banks (and other financial institutions) need to stay vigilant and act fast to prevent the loss of both money and reputation that follows each fraudulent incident. Fraud is expensive, but fraud prevention, detection and remediation can also be costly.