Posts about Security
Featured article
Featured
Security Considerations in Data Mesh
Explore the security considerations in a decentralized data mesh architecture. Learn about the challenges and best practices for maintaining data integrity and privacy in a distributed environment.
Read MoreSecuring the Data Lake: Data Security in a Data Lake
Discover the multifaceted nature of data lake security and the challenges organizations face in protecting their valuable data. Learn about the intricate security measures and governance considerations needed to create a robust and resilient security architecture. Find out how authentication, authorization, data encryption, data masking, tokenization, monitoring, and auditing play a crucial role in securing data lakes. Explore the role of machine learning in data lake security and the future of data lake security in an evolving threat landscape.
Security
Security Considerations in NoSQL Databases
Learn about the unique security challenges and best practices for securing NoSQL databases. From authentication and encryption to patch management and compliance, discover how to protect your data effectively.
Security
ELT Security Considerations
Discover the importance of securing your ELT processes and mitigating risks in this comprehensive blog. Learn about vulnerabilities, real-world breaches, and essential security measures for your data-driven organization.
Security
Application Integration Security
Explore the complexities of securing application integration—from risk analysis to emerging technologies. Discover best practices and tools for a robust security posture.
Security
APIs under attack: how to prepare for and respond to breaches
Learn how to secure your APIs from attacks with technical controls, incident response and disaster recovery plans. Don't wait until it's too late.
API Management
Are you really in charge of your digital identity?
Discussions around digital identity could become complicated, simply because your digital identity could be shaped in various ways.
Security
Exploring the "edge" of the internet
The industry is currently witnessing the rise of edge computing, where local devices that capture and store data are becoming more and more ubiquitous.
Cloud Computing
Intimidated by OAuth? Here’s why you shouldn’t be
According to the OAuth website, 'OAuth is the industry-standard protocol for authorization', which focuses on simplicity while providing specific authorization flows for web applications.
Microservices
The risks and rewards of going cloud-native
The cloud has provided the world with a new consumption model for information technology, significantly changing the way that software and servers are procured and deployed.