Systems | Development | Analytics | API | Testing

Security

18 Great Plugins to Keep Your eCommerce Website Secure

The threats of hackers and data theft grows by the day and even smaller eCommerce sites are not safe from attack. Security should be a top priority for any eCommerce website owner, no matter how big or small their site may be. Fortunately, there are plenty of great security plugins available to help keep your site safe and secure. In this article, we will take a look at 18 of the best plugins for keeping your eCommerce site secure.

Built with BigQuery: Material Security's novel approach to protecting email

Since the very first email was sent more than 50 years ago, the now-ubiquitous communication tool has evolved into more than just an electronic method of communication. Businesses have come to rely on it as a storage system for financial reports, legal documents, and personnel records. From daily operations to client and employee communications to the lifeblood of sales and marketing, email is still the gold standard for digital communications.

How to Plug an Existing User Store into WSO2 Identity Server?

Are you someone who already has a legacy system in place and wants to migrate to a modern authentication system with Identity and Access Management (IAM) features? The first thing you need to consider is how you can use the existing legacy user store with this new system. Keep in mind that if the legacy user store uses an old security mechanism to store your data, we would recommend that you migrate to the WSO2 JDBC user store format or Active Directory (AD).

Proof of possession for OAuth2 tokens(DPoP) with WSO2 Identity Server #Identityin15

In today's episode, we will discuss how you can secure OAuth2 Tokens with DPoP using the WSO2 Identity Server. DPoP (Demonstrating-Proof-of-Possession) is an additional security mechanism for the token generation which overcomes the issue of bearer token which will not validate between who is requested token and who is actually using the token for the access of a particular resource. The following is the outline for today's session.

How to set up SonarQube and integrate it with Codemagic

SonarQube by SonarSource is the leading tool for continuously inspecting the code quality and security of your codebase and guiding development teams during code reviews. It is an open-source tool that has support for 29 programming languages as of the time of writing this article, and the number is growing. SonarQube’s key features include.

Software Security in Embedded Systems and Internet of Things

Technology is booming now more than ever, and every day brings new products and functionality for every unimaginable task. It is not just about mobile apps and computers anymore; instead, it is all about embedded systems and Internet-of-Things (IoT) devices that have quickly become so commonplace in our day-to-day lives. It feels like these devices are running software for just about everything: baby monitors, speakers, fitness trackers, security cameras, thermostats, and vehicles to name just a few.

The Future of Passwordless Authentication

Do you recall what your first password was? It was probably something easy that you could remember easily, such as your birthdate or the name of your pet. However, as you created additional online accounts, your passwords grew more complex and difficult to remember. It's a problem that many people face. As a result, many of us tend to reuse passwords across many accounts, exposing our personal information to theft.

How To Scale Threat Detection & Response With Snowflake & Securonix

Securonix brings exciting new capabilities to the field of threat detection and response thanks to its integration with Snowflake. Together, the two companies provide a split-architecture solution that solves the problem of data silos and enables organizations to make better, more timely decisions about potential threats to their organization. It’s a next-gen SIEM solution already finding widespread use in such organizations as healthcare institutions, airlines, and telecommunication companies.

4 Years Ago, the GDPR Changed Everything. Now What?

The EU’s General Data Protection Regulation is approaching its 4th year anniversary since it was implemented in May 2018. Since its inception, it has been hailed as a groundbreaking framework for making users’ rights on the Internet a human right. Its impact in many other markets has been undeniable and it truly has affected how the world of the Internet works, even outside EU borders.