Systems | Development | Analytics | API | Testing

Security

Accelerate AI Adoption with Enterprise-Grade Security and Control in Kong Gateway 3.7

The latest release of Kong Gateway 3.7 brings exciting advancements in AI integration and API security. With the general availability of Kong’s AI Gateway, organizations can now securely leverage multiple large language models (LLMs) through a unified API, enabling centralized management, usage visibility, and data protection via a powerful AI firewall.

Top 9 Trends in Cybersecurity for 2024

Security and risk management (SRM) leaders face disruptions on technological, organizational, and human fronts. Preparation and pragmatic execution are key for dealing with these disruptions and providing the right cybersecurity program. Gartner’s latest report listed the top 9 cybersecurity trends for 2024. Here are excerpts from the report. Organizational attack surfaces have grown enormously in recent years.

Retail Media's Business Case for Data Clean Rooms Part 2: Commercial Models

In Part 1 of “Retail Media’s Business Case for Data Clean Rooms,” we discussed how to (1) assess your data assets and (2) define your data structures and permissions. Once you have a plan on paper, you can begin sizing the data clean room opportunity for your business.

NASA's 10 Rules for Developing Safety-Critical Code

NASA Jet Propulsion Laboratory’s Laboratory for Reliable Software developed a set of code guidelines for developing safety-critical code. The NASA's 10 rules are intended to eliminate C coding practices that make it difficult to review or properly analyze with static analysis tools. Enforce NASA's 10 Rules With Klocwork.

Enhanced Security, More Control with GitHub App

Blog post summary: We have a new, improved way to integrate with GitHub using a GitHub App. It offers a more secure connection and granular control of which repositories Bitrise can access. Full integration with GitHub Checks allows developers to quickly identify if their changes have broken any existing functionality, improving workflow efficiency.

Retail Media's Business Case for Data Clean Rooms Part 1: Your Data Assets and Permissions

It’s hard to have a conversation in adtech today without hearing the words, “retail media.” The retail media wave is in full force, piquing the interest of any company with a strong, first-party relationship with consumers. Companies are now understanding the value of their data and how that data can power a new, high-margin media business. The two-sided network that exists between retailers and their brands turns into a flywheel for growth.

The ABCs of ASM: Understanding Attack Surface Management for Better Security

Enterprises are encountering an ever-increasing number of threats to their digital assets. Attack Surface Management (ASM) has emerged as a crucial practice to mitigate these risks and enhance overall cybersecurity. By understanding and effectively managing the attack surface, enterprises can proactively identify and address vulnerabilities, reducing the likelihood of successful attacks.