Systems | Development | Analytics | API | Testing

Best practices for securing your applications and APIs using Apigee

Enterprises across the globe are seeing surging demand for digital experiences from their customers, employees, and partners. For many of these enterprises, hundreds of business applications are hosted in private or public clouds that interact with their users (customers, partners, and employees) spread across geographies, channels (web, mobile, APIs, VPNs, and cloud services), and time zones.

Interview with CISCO, Victor Kritakis

For the next interview in our series speaking to technology and IT leaders around the world, we’ve welcomed experienced CISCO Victor Kritakis, of Epignosis. As the head of the company’s information security policy, he is responsible for penetration testing and vulnerability assessments, staff cybersecurity training, administration of the bug bounty program, as well as maintaining the ISO 27001 certification standards.

Token-Based Access Control With Kong, OPA and Curity

As APIs and microservices evolve, the architecture used to secure these resources must also mature. Utilizing a token-based architecture to protect APIs is a robust, secure and scalable approach, and it is also much safer than API keys or basic authentication. However, token-based architecture comes in varying maturity levels, as outlined by the API Security Maturity Model.

Two-Factor Authentication(2FA) using Speakeasy

Normally, you must submit a password in order to log into an application. In the case of two-factor authentication, you must also provide a one-time temporary password (also known as a token) in addition to your regular password. You can get this OTP in a variety of ways. The different varieties of 2FA are determined by how the OTP is provided. The OTP can be sent via email, SMS, as a software token using applications such as Google Authenticator, or as a hardware token.

An Ultimate Guide about SQL Injection for WordPress Users

The Structured Query Language (SQL) is a Relational Database Management System (RDBMS) that is pronounced like the word "sequel." It was the first simple way to store and retrieve many sorts of data on computer systems, and it was invented in 1974. Since then, the language has grown in popularity, and it is still used in many content management systems (CMS) today, such as WordPress.

IP Security Vulnerability Detection

The severity and ingenuity of cyberattacks continues to increase as malicious actors become more proficient, breaking through the software layers and aiming to also compromise hardware like integrated circuits. Relative to software, it is much more difficult to patch security vulnerabilities in ICs – making early identification of IP security weaknesses increasingly important.

How to Turn on Change Data Capture (CDC)

2.5 quintillion bytes of data are produced every day, and those numbers are continually increasing. With such astronomical volumes of data, businesses have to understand and interpret data faster than ever before. However, data transfers must occur for businesses with millions of data entry points to properly store and interpret their data.

Managing Secrets in a central location: Secret Envs filtering

We’ve just released (the first phase of) a new feature called Secret Envs filtering that enables managing secrets in a central location. Now you can set env vars as secrets from within your Workflows, mask them, and with a Script Step, use secrets from an external vault/company’s own service.