Systems | Development | Analytics | API | Testing

Snowflake's Newest Workload for the Data Cloud: Cybersecurity

Cybersecurity is a data problem at its core. Yet, security teams haven’t achieved tremendous success in utilizing the modern data stack that data analytics teams have enjoyed for years. Security teams face constant pressure from vulnerabilities and breaches in their infrastructure and supply chains because they remain on a proverbial island with antiquated technology. Cybersecurity leaders must uplevel their strategies by implementing a modern security data lake.

CIAM Responsible Solutions for Creating Positive Consumer Experiences - CIAM Trend Chat NA 2022

Consumers see the world as all digital with no divide. As a result, whether those consumers are young, old, digitally savvy, or technophobes; organizations are going to have to find a way to ‘deliver better customer interactions’ than their competitors if they are to acquire and retain them. Customer Identity and Access Management (CIAM) can be defined as “A customer-focused IAM discipline that facilitates leveraging identity data with business data to catalyze business growth”.

Validate WSO2 API Manager gateway request with open policy agent

Open policy agent (OPA) enables you to write security and compliance policies as code, or call any external policies using the OPA standard. WSO2 API manager uses this capability to offload policy decisions of API gateway requests to this policy engine. By decoupling the policy enforcement from evaluation, API policymakers now have the opportunity to write dynamic and reusable policies for ever-changing requirements. You can then reuse an OPA policy like any other policy in the API Manager by graphically dragging and dropping it into a policy pipeline. This video explains how it works and gives a demo.

API Security: Tips and Practices to Keep Your System Safe

As more and more businesses move to API-driven architectures, the need for strong API security increases. If your business relies on APIs to connect different parts of your infrastructure, you need to make sure your APIs are adequately secured. This article will discuss API security best practices to protect your data.

One-Time Authorization Code for REST APIs in WSO2 Identity Server

WSO2 Identity Server provides many identity management workflows and password management workflows out of the box, e.g., self-registration, user invitations, password recovery, etc. However, it is not unusual to come across a situation where the workflow capabilities provided out of the box in the product, is not sufficient to fulfill your business requirement.

Re-issue Existing Password Recovery Confirmation Code in Followed Recovery or Resend Requests

Photo by Micah Williams on Unsplash This article discusses a new feature which will be released for the public distribution of WSO2 Identity Server 5.12.0. This feature was developed to overcome the following scenario: You can refer to the following diagram for a deeper understanding of the above flow. This scenario can be experienced by anyone. As such, we introduced a new way to handle this scenario (as shown below) for the notification based password recovery flow.

18 Great Plugins to Keep Your eCommerce Website Secure

The threats of hackers and data theft grows by the day and even smaller eCommerce sites are not safe from attack. Security should be a top priority for any eCommerce website owner, no matter how big or small their site may be. Fortunately, there are plenty of great security plugins available to help keep your site safe and secure. In this article, we will take a look at 18 of the best plugins for keeping your eCommerce site secure.