Systems | Development | Analytics | API | Testing

You can trust us: we are HIPAA compliant

Can you keep a secret? What will it take for me to trust you to keep and protect a secret that I share with you? If you are a friend or family member, I may not need more than you saying “Yes”, but if I don’t know you, I will likely want additional guarantees or proof that I can trust you. This is particularly true if you are an organization handling personal information about me.

Plugging Git Leaks: Preventing and Fixing Information Exposure in Repositories

Have you ever been neck-deep building a new feature? You're working at capacity. You need to test something out so you paste an API key into your source file with every intention of removing it later. But you forget. You push to GitHub. It's an easy mistake, and potentially a very expensive one. In this article, Julien Cretel explores the nuances of this kind of data leak, offers suggestions for recovery when leaks happen and gives us options for preventing them in the first place.

Unravel Earns Prestigious SOC 2 Security Certification

RELATED BLOG POSTS Unraveling the Complex Streaming Data Pipelines of Cybersecurity Best Practices Blog 5 Min Read Security is top of mind for every enterprise these days. There are so many threats they can hardly be counted, but one commonality exists: data is always the target. Unravel’s mission is to help organizations better understand and improve the performance of their data-based applications. We’re a data business, so we appreciate the scope and implications of these threats.

5 Best Security Practices for Tomcat Servers

Tomcat servers are widely used application servers for today’s development architectures, popular for hosting Java based applications. Below is a guide on best security practices for security your Tomcat Server environment. Banner grabbing is the process of gaining information from computer systems including services, open ports, version, etc. When sending a server host request via telnet command, you pass along the server name, port, and version.

The data-conscious organization's solution to fake news: moderation, management and transparency

“In god we trust, all others must bring data,” a line attributed to the American statistician, W. Edwards Deming, highlights the importance of statistical measurement and analysis in verifying facts and confirming their viability. However, as the volume of data grows exponentially, this becomes far more difficult with each passing month. While the fake news epidemic may be most noticeable on social media platforms, businesses face a similar challenge internally.

Top 10 Bank Leverages Unravel's AIOps capabilities to tame fraud detection and compliance app performance failures

Unsurprisingly, Modern data apps have become crucial across all areas of the financial industry, with apps for fraud detection, claims processing and compliance amongst others playing a business critical role. Unravel has been deployed by several of the world’s largest financial services organizations to ensure these critical apps perform reliably at all times.

Configuring AWS GuardDuty with Lambda for Slack Notifications

At Kong, we leverage many tools to protect our services and customers. Terraform from HashiCorp allows us to automate the process with Infrastructure as Code (IaC). Another important tool is Amazon Web Services (AWS) GuardDuty, a continuous monitoring service for security threat detection in your AWS accounts.

CCPA will be live in less than 3 months. Do you have a plan?

In January, I’ll start a new game: ask a company to retrieve all the information they have about me in less than 45 days. One of the requirements of CCPA, is to be able to reply to a customer request to have access to all the data you have about them in less than 45 days. These are called the Verifiable Customer Requests. You may be able to complete 10, 20 replies. But what if you received 10 every day? What does it take to keep your customers happy and being compliant?

5 Best Practices for Securing Microservices at Scale

As outlined in a previous article on security challenges for microservices, DevOps are getting more widely distributed, spread thin, and forced to plan for higher levels of interactivity as well as evolving national security “backdoor” measures. Microservices, born from a still-emerging DevOps laboratory environment, can be deployed anywhere: on-prem, in the public cloud, or a hybrid implementation.