Systems | Development | Analytics | API | Testing

Security

Authentication and Authorization for RESTful APIs: Steps to Getting Started

Why do APIs require authentication in the first place? Users don't always need keys for read-only APIs. However, most commercial APIs require permission via API keys or other ways. Users might make an unlimited number of API calls without needing to register if your API had no security. Allowing limitless requests would make it impossible to develop a business structure for your API. Furthermore, without authentication, it would be difficult to link requests to individual user data.

How To Setup an SSH Tunnel Connection

In this video, we will set up an SSH tunnel connection within Xplenty to access a server on a private network. When configuring SSH tunnels for connecting to databases, authentication is performed using the SSH server. This can be done via either user name and password authentication or by using key-based authentication. Key-based authentication gives the user the ability to log in without a password.

Interview with Cybersecurity Specialist Charles Denyer

For our latest specialist interview in our series speaking to technology leaders from around the world, we’ve welcomed Charles Denyer. Charles is an Austin-based cybersecurity and national security expert who has worked with hundreds of US and international organizations. He is a founding member and senior partner in two consulting and compliance firms.

Interview with Lia Edwards

In the latest instalment of our interviews speaking to leaders throughout the world of tech, we’ve welcomed Lia Edwards. Lia leads the consultancy side of Threat Protect’s service offering having operated as CIO for several multinational corporations, including Fresnel before co-founding Threat Protect, where she provides consultancy and support on compliance and audit projects, working with clients such as KPMG among others.

How to Develop a Cloud Native Infrastructure

More and more companies are eager to move their operations to the cloud. Yet, there’s quite a bit of ambiguity on what moving to the cloud actually means. Is your business running in the cloud while you host your database on another platform or while you rely on a third-party service to handle your payments? That’s a good start for moving to the cloud, but there are many other aspects to consider when building a cloud native infrastructure.

Fixing Ransomware First Requires That We Fix Security

Ransomware has become a familiar front page news topic thanks to recent high-profile attacks against a major meat producer and an East Coast operator of a critical oil pipeline. Also, consider the attack on a provider of software tools to IT outsourcing shops that let hackers paralyze hundreds of businesses on all five continents. No doubt the ransomware threat is serious, and now Washington is mobilizing to wipe out a scourge it formerly treated only as a criminal nuisance.

What is the Best Way to Move My Data Securely?

Moving data from an organization’s systems into data warehouses and data lakes are essential to fuel business intelligence and analytics tools. These insights guide businesses into making decisions backed by data, allowing them to choose actions that have the best chance of positive growth. However, getting data from the source systems to these data stores can be a harrowing process.

How To Transfer Flat Files Using SFTP With Xplenty

What is SFTP and What Does It Stand For? SFTP is a network protocol for securely transferring, accessing, and managing files on a remote computer. The SFTP protocol is intended as a more secure alternative to the traditional FTP protocol. The term SFTP stands for SSH File Transfer Protocol, where SSH is a cryptographic protocol that allows clients and servers to connect remotely. The files that you send or receive using SFTP are protected by SSH encryption in transit. This added layer of security means that SFTP is preferable to FTP in the vast majority of cases.

The Journey to Processing PII in the Data Cloud

During the process of turning data into insights, the most compelling data often comes with an added responsibility—the need to protect the people whose lives are caught up in that data. Plenty of data sets include sensitive information, and it’s the duty of every organization, down to each individual, to ensure that sensitive information is handled appropriately.