Systems | Development | Analytics | API | Testing


How to Plug an Existing User Store into WSO2 Identity Server?

Are you someone who already has a legacy system in place and wants to migrate to a modern authentication system with Identity and Access Management (IAM) features? The first thing you need to consider is how you can use the existing legacy user store with this new system. Keep in mind that if the legacy user store uses an old security mechanism to store your data, we would recommend that you migrate to the WSO2 JDBC user store format or Active Directory (AD).

How to set up SonarQube and integrate it with Codemagic

SonarQube by SonarSource is the leading tool for continuously inspecting the code quality and security of your codebase and guiding development teams during code reviews. It is an open-source tool that has support for 29 programming languages as of the time of writing this article, and the number is growing. SonarQube’s key features include.

Software Security in Embedded Systems and Internet of Things

Technology is booming now more than ever, and every day brings new products and functionality for every unimaginable task. It is not just about mobile apps and computers anymore; instead, it is all about embedded systems and Internet-of-Things (IoT) devices that have quickly become so commonplace in our day-to-day lives.

The Future of Passwordless Authentication

Do you recall what your first password was? It was probably something easy that you could remember easily, such as your birthdate or the name of your pet. However, as you created additional online accounts, your passwords grew more complex and difficult to remember. It's a problem that many people face. As a result, many of us tend to reuse passwords across many accounts, exposing our personal information to theft.

How To Scale Threat Detection & Response With Snowflake & Securonix

Securonix brings exciting new capabilities to the field of threat detection and response thanks to its integration with Snowflake. Together, the two companies provide a split-architecture solution that solves the problem of data silos and enables organizations to make better, more timely decisions about potential threats to their organization. It’s a next-gen SIEM solution already finding widespread use in such organizations as healthcare institutions, airlines, and telecommunication companies.

4 Years Ago, the GDPR Changed Everything. Now What?

The EU’s General Data Protection Regulation is approaching its 4th year anniversary since it was implemented in May 2018. Since its inception, it has been hailed as a groundbreaking framework for making users’ rights on the Internet a human right. Its impact in many other markets has been undeniable and it truly has affected how the world of the Internet works, even outside EU borders.

With Identity Management, Start Early for Less Tech Debt

First published on The New Stack. A problem starts to reveal itself. The team has finished a minimum viable product’s (MVP) business features, and user personally identifiable information (PII) has merged into the same domain as other core objects. Social logins bring their own attributes that need to be captured but don’t line up.