A vision for making open source more equitable and secure

Open source has a widely recognized problem that has yet to be adequately addressed. While open-source projects have become foundational pieces upon which the internet and all its innovations are built, they operate mainly as labors of love. And when open source is created and maintained with little or no compensation for its developers, that’s … Read more

Secure Your Apps With Spring Boot Validation and Bean Manipulation | by ELATTAR Saad | May, 2022

A look at the two ways to handle security Secure applications follow several security measures during their dev and prod phases, the app entry points are one of the most important parts to secure due to the risk of data injection that may occur. Spring offers its way of data validation which improves controlling these … Read more

Secure Proxy for HIPAA-Compliant API Analytics

In HeathTech apps, it’s often the case that you’re dealing with private or health-related data. This requires compliance with regulations, such as HIPAA in the United States. These regulations force you to handle sensitive data in a well-defined manner, so only specific people can read it, and if they do, it should be logged for … Read more

Secure Your WSO2 Micro Integrator Deployment

WSO2 Micro Integrator (for short, let’s use MI) is an integration solution that is widely used in enterprise integration. You can use MI to implement mediation policies, message transformation, security, and more. In this article, we are going to focus on how you can securely place MI on your deployment. First Things First WSO2 MI … Read more

How to Secure Webhook Endpoints With HMAC

Webhooks are ubiquitous in SaaS integrations, and there’s a good reason for that. They are a simple and speedy way to transfer data via HTTP callbacks between systems based on changes to data in those systems. In this post, we’ll describe the recommended approach. But first, let’s lay some groundwork. How Do Webhooks Work? In … Read more

SAST in Secure SDLC: 3 Reasons to Integrate It in a DevSecOps Pipeline

Vulnerabilities produce enormous reputational and financial risks. As a result, many companies are fascinated by security and desire to build a secure development life cycle (SSDLC). So, today we’re going to discuss SAST — one of the SSDLC components. SAST (static application security testing) searches for security defects in application source code. SAST examines the … Read more

Setting Up Dgraph With Auth0 To Secure Your GraphQL Endpoint | by Flo Ragossnig | Apr, 2022

Part 3: The bridal This is the third article of this series which explains how to set up Dgraph with Auth0 for our demo project. If you haven’t set up Dgraph nor Auth0, you might want to read Part 1 and/or Part 2 of this series. If however, you are only interested in the proper … Read more

Why Do Developers Need Code Signing Certificate to Secure Mobile Applications?

The mobile application industry is thriving day after day. The success of this industry is majorly necessitated by the increase in smartphone usage. Statista estimates that there will be close to 7.6 billion smartphone users by 2027. Mobile applications enhance android functionality and come with many benefits to the user. Developers should take advantage of … Read more