Security

Skyflow Employs Polymorphic Encryption Enabling Secure PII Data

Skyflow today revealed it has added a data governance engine to a data privacy vault that enables developers to build applications that access encrypted personally identifiable information (PII) in a way that eliminates the need for them to be concerned about compliance requirements. The PII Data Privacy Vault incorporates a Skyflow Data Governance Engine that provides access to data via a REST application programming interface...

DevSecOps Requires Time and Effort to Secure Software Supply Chains

There is understandably a lot of focus these days on the best DevSecOps practices in the wake of a rash of high-profile cyberattacks against software supply chains. However, as well-intentioned as those efforts may be, they often don’t take into account just how big a challenge adopting best DevSecOps practices really is for most organizations. DevSecOps is an extension of a DevOps approach to building...

Best Practices in Cloud Security

Cloud Security comprises the technologies and methods to protect cloud computing systems from cybersecurity threats. This article discusses the best practices to ensure that your cloud-based data and apps are secured. What is Cloud Security? As organizations strive to enhance their businesses and global reach by using cloud computing, cloud security and the related best practices are imperative to combat the existing and future threats to...

Can AI and Automation Solve Coding Security Woes?

Developers these days are expected to write code faster, ship it faster, and keep it secure. But those expectations inevitably lead to small mistakes or misconfigurations - and developers already spend an inordinate amount of time checking code. In a worst-case scenario, it sometimes happens that passwords or API keys are left in the code. The resulting security breaches not only expose confidential data, they...

Developers Prefer Dentist Visits, In-Laws to Fixing Bugs: Survey

New data reveals that fixing bugs and errors in code is the top developer pain point. According to the 2021 Report | The State of Software Code commissioned by Rollbar, manually fixing code is negatively impacting developers' productivity and morale. At a time when there are not enough developers to meet demand, it appears that more automation is needed to relieve some of the drudgery. 38%...

An Introduction to the Java Security API

Security is one of the most important parts of application development. The Java language makes it easy to develop secure applications by providing many options and features that make applications secure. Because it is a big topic, this article shall a touch upon a few key aspects of the security features and APIs available in the Java platform. Overview The Java platform, from the ground up,...

Ten Security Issues Developers Overlook While Developing Apps

By Anas Baig. Hundreds of thousands of mobile applications are downloaded by users on the Internet every day. Likewise, thousands of applications hit the app stores on a daily basis. The extreme use of mobile applications shows how deeply we are engaged in our "connected" life than ever before. Not only mobile devices have invaded our households, but these devices are raiding the corporate sector with...

Securing the Software Development Process

It has become well established that maintaining the security of information systems hinges on more than just placing a firewall in front of a system and calling it a day. Security needs to be approached holistically, and that includes applications being developed with security in mind. The analyst firm Gartner has been attributed with saying that over 70% of security vulnerabilities exist at the...

Top Five Security Practices for Automating DB Changes

By Robert Reeves, CTO and co-founder, Datical Introduction For the past 30+ years, the database administrator has been the last (and only) line of defense to prevent security violations in SQL scripts. And, that has been very successful…until application development speed and release frequency started increasing. Now that applications are releasing daily (hourly?), the validation and execution of database changes need to be automated. That involves...

How to Bypass Accessibility Checks Through Reflection in Java

Programming in reflection is sometimes like playing with the privacy of Java internals and getting into the diversion of exploiting secure Java code. We do not get into the details of whether to keep the loopholes for exploitation alive (not likely) or an intentional convulsion of security breaches (nope, rather, an open kitchen, where you can extend your ideas to work) within JVM. The...

Latest Articles