Systems | Development | Analytics | API | Testing

Security

Continual is SOC 2 compliant

Continual is proud to announce that we are now SOC 2 Type 1 compliant and SOC 2 Type 2 in progress. This certification demonstrates our core commitment to your data security and privacy. We expect to make additional announcements around our security certification efforts over the coming months. Beyond third party attestations, Continual is built from the ground up for data security, privacy, and governance at enterprise scale.

How to load test OpenID/OAUTH

Performance testing scripts need to go through authentication in order to access target services with the right authorization. They also need to validate that the authentication servers are able to handle the target load. OpenID Connect(OIDC) has become a popular authentication and authorization protocol for securing web applications. This article will present the OIDC protocol and how to implement a JMeter script to performance test it.

Top 6 Security Traps to Avoid in JIRA Implementation

According to Gartner, JIRA is still one of the most popular application lifecycle management (ALM) technologies in many enterprises, with a rating of 4.4 out of 5 for its features. Determining an “issue permission” enabled with the proper security constraints and balancing its project access control is always a difficult challenge in an enterprise JIRA setup.

API Security Risks and How to Mitigate Them

Today, more organizations than ever before rely on web and mobile applications and partner integrations to help them automate and scale, making APIs essential to today’s software ecosystem. But because APIs are gateways to sensitive data, this also makes them an attractive target for hackers who are constantly evolving their strategies to access private information.

What Role Does Microsegmentation Play in Zero Trust Security?

With digital transformation shifting networks into the cloud — from remote workforces to online banking — cyberattacks are growing more prevalent and sophisticated. Legacy security models like VPNs and perimeter-based firewalls are proving inadequate in addressing modern threats because perimeters are becoming harder to define.

2 reasons why you shouldn't forget about security coding

What is Appdome? How does it work? Is Appdome like a firewall for mobile applications? In this week’s episode of the Test Case Scenario, Appdome’s Senior Product Manager Kurt Dusek joins our panelists. They discuss the many incredible features of this cyber defense automation platform, how it detects and fights against cybersecurity threats, and more.

A New Kind of Hybrid Cloud, Built for Partner Simplicity

In light of tightening budgets, rising costs, and heightened demand for compliance and innovation, there’s no doubt that many companies are increasingly relying on hybrid cloud environments to modernize their current infrastructure and IT operations. But, according to a recent survey, nearly half of businesses are struggling due to the rapid integration of cloud technologies, the complexity of integration processes, a lack of skilled personnel, and the need for comprehensive cybersecurity measures.

API Security - Implementing API Security by Design

In this video, Frank Kilcommins from SmartBear and our special guest, José Haro Peralta, author of "Microservice APIs" demonstrate practical steps, workflow tricks, and the essential tools you need to beef up your API security, from start to finish, including design and development. They recap on the initial Security-By-Design session, to cover OWASP Risks, AuthNZ nuances, Common Design Vulnerabilities before going on a Hands-On walkthrough delivering an API with security in mind from the get go!

Mobile app security is just like housekeeping

What is Appdome? How does it work? Is Appdome like a firewall for mobile applications? In this week’s episode of the Test Case Scenario, Appdome’s Senior Product Manager Kurt Dusek joins our panelists. They discuss the many incredible features of this cyber defense automation platform, how it detects and fights against cybersecurity threats, and more.