Systems | Development | Analytics | API | Testing

How to Create SSL Certificates for Nginx Using Certbot: A Complete Guide

Securing your web applications with HTTPS is essential for production deployments. SSL/TLS certificates encrypt data in transit, protect user privacy, and improve search engine rankings. For Nginx web servers, Certbot from Let's Encrypt provides a free, automated solution for obtaining and managing SSL certificates. This guide walks you through implementing SSL certificates on Nginx using Certbot, covering installation, certificate generation, and automated renewal.

Find Financial Fraud Fast: Anomaly Detection with ThoughtSpot Python Notebook & Google Sheets

Anomaly detection is crucial for financial analysis, and you don't need to leave your BI environment to do it! This video demonstrates a powerful workflow using ThoughtSpot Analyst Studio’s Python Notebook to perform advanced statistical analysis on your data.

Best Programming Languages for Automotive Cybersecurity

As the automotive industry accelerates toward increasingly connected and autonomous vehicles, the importance of cybersecurity in embedded software development has never been greater. But how should you go about choosing the right programming language for automotive cybersecurity?

RBAC for API Tutorial: How to secure your API with RBAC and support Multi-tenant Considerations

In this Tutorial, you’ll learn how to build a secure REST API using Role Based Access Control Here’s what you’ll discover in this step-by-step guide: How to configure database API access (full access, schema access, table access, stored procedures, and functions) How to apply enterprise-grade security with API keys and role-based access control (RBAC) How to support multi-tenant scenarios with RBAC that supports record or row level security.

Strengthening Your Security: Two-Factor Authentication Now Available on OctoPerf

In today's security-conscious world, relying on a password alone is no longer enough. With 2FA enabled, even if your password is compromised, the attacker would still need access to a second verification method (your authenticator app) to get in. At OctoPerf we're committed to helping you safeguard your valuable test configurations, results, and reports - 2FA is an essential step in that mission.

10 Smart Ways PIs Use Open Source Intelligence to Track Individuals

Are you one of those people who believe that their internet presence fades when they press the delete button? That's cute. In the modern digital era, all posts, likes and comments leave a trail of evidence and a private detective knows how to trace it. With the assistance of Open Source Intelligence (OSINT), professional PIs sift through publicly available data, social media, and Internet habits to reveal the truths most individuals believe to be concealed. Starting with the tracking of unknown profiles to the connection of dots, OSINT has become the arsenal of a modern detective.

SmartBear Hackathon Demo | AI-Powered Test Automation in SAP Cloud ALM

Watch this demo to learn how SmartBear’s winning project at SAP’s 2025 ALMathon brings AI-powered testing directly into SAP Cloud ALM. At this hackathon, SAP challenged teams to build innovative extensions. The SmartBear team delivered a cloud-first, AI-native solution that eliminates manual testing bottlenecks while aligning seamlessly with existing workflows. In this demo, you’ll see how our integration enables.

OAuth Scope Naming: 7 Best Practices

OAuth scope naming is critical for securing APIs and simplifying their use. Poorly named scopes can confuse developers and create security risks, while clear, consistent naming ensures precise permissions and easier maintenance. Here’s a quick summary of best practices: Use Clear, Descriptive Names: Follow a resource.action format like users.read to specify both the resource and action. Maintain Consistency: Stick to a unified naming pattern across all APIs to avoid confusion.

What is Exposure Management? Explained for Vulnerability Management Teams

If you're a vulnerability management professional or have experience leading teams that do vulnerability management, you know CVEs inside and out. You've got your scanning tools configured, your patch cycles running, and your CVSS score thresholds set. But lately, something probably feels off. Maybe it's the fact that breaches keep happening despite all the patching. Maybe it's that your CVE count keeps growing faster than you can remediate. Or maybe you're just tired of explaining why that "critical" vulnerability in a disconnected test server isn't actually critical.