Systems | Development | Analytics | API | Testing

Preventing PII in Test environments

Data privacy and security are a top concern for most organizations. It’s easy to see why given changes over the past few years. These types of protections can be great for us as consumers. However, they also make it extremely difficult to create realistic production simulations in pre-production. It’s hard to rapidly develop new applications if you can’t iterate against realistic data.

6 Important Questions to Ask Before Choosing Your Web Host Provider

In this digital age, a company website is a sine qua non for most successful businesses. Your company website gives the ever-crucial first impression to your potential customers. Well, the experience your consumers will have will depend on the web hosting service you pick. A good web hosting provider will do heavy lifting for you. However, the plethora of reputable web hosting services in the market can make it hard to decide which one would best suit your company. It calls for careful research and consideration to select the best fit for your website.

Using OAuth2 to access Emails

OAuth 2.0 is becoming a popular alternative for application authentication. With Microsoft discontinuing Basic authentication and making OAuth 2.0 one of their new standards, many developers are sure to be in a situation where they need to change how they handle authentication for popular applications such as mailboxes, exchange services, and more. This article will briefly touch on OAuth 2.0, how it can be used, and an example of using it read mail from an Office 365 mailbox.

Surviving the API Security Apocalypse

With more and more businesses transforming themselves digitally, it has become critical to secure your APIs. An insecure API is an easy target for attackers to gain access to an otherwise secure computer or network. We invite you to learn about API security best practices to protect against cyberattacks, API misuse, data breaches, and zombie APIs.

Taming the Tech Stack: Leverage Your Existing Tech Stack Securely With an Analytics Layer

Analytics and data visualizations have the power to elevate a software product, making it a powerful tool that helps each user fulfill their mission more effectively. To stand apart from the competition, today’s software applications need to deliver a lot more than just transaction processing. They must also provide insights that help drive better decisions, alert users to matters that require their attention, and deliver up-to-the-minute information about the things that matter most.

Cybersecurity: A Big Data Problem

Information technology has been at the heart of governments around the world, enabling them to deliver vital citizen services, such as healthcare, transportation, employment, and national security. All of these functions rest on technology and share a valuable commodity: data. Data is produced and consumed in ever-increasing amounts and therefore must be protected. After all, we believe everything that we see on our computer screens to be true, don’t we?

Using Kafka Connect Securely in the Cloudera Data Platform

In this post I will demonstrate how Kafka Connect is integrated in the Cloudera Data Platform (CDP), allowing users to manage and monitor their connectors in Streams Messaging Manager while also touching on security features such as role-based access control and sensitive information handling. If you are a developer moving data in or out of Kafka, an administrator, or a security expert this post is for you. But before I introduce the nitty-gritty first let’s start with the basics.

Is Fortify Static Code Analyzer the Right Choice for Your Next SAST Tool?

There are many embedded systems out there, but only a few static code analysis tools that realistically support embedded software developers. The recent acquisition of Micro Focus by OpenText, including the Fortify Static Code Analyzer, reignites the question of which static code analysis tool is best for your embedded software project. Between Fortify and Klocwork, our experts have the answer.

CIAM: Codifying the ever-changing keys to B2B commerce

WSO2 recently announced the release of their Private CIAM Cloud service, and it made me think about the changing role of personal identity versus business entity in today’s complex distributed software environments. The CIAM space has evolved far beyond the traditional end user’s need for identity and access to applications in a B2C (business to customer) scenario.