security | TechWell

security

4 DevOps Security Challenges and Solutions 4 DevOps Security Challenges and Solutions

Various cultural and technical challenges can impact DevOps security, but the main security issues generally derive from the gap between the security and development teams.

Gilad David Maayan's picture
Gilad David Maayan
4 Questions to Audit API Security 4 Questions to Audit API Security

In the first half of 2021, API attacks had increased by 348%. With the proliferation of APIs, we have every reason to plan for an increase in the number and complexity of attacks. This questioning to API security provides lines of inquiry that lead to a better understanding of how APIs fit into security and business.

Ross Moore's picture
Ross Moore
The 5 Biggest Challenges Facing the IoT Today The 5 Biggest Challenges Facing the IoT Today

The Internet of Thing's rapid growth and prevalence has brought with it a host of unique challenges that have to be addressed as we continue to integrate it into our personal and professional lives. So, let’s look at why they exist, and possible solutions to them.

Matthew Cooper's picture
Matthew Cooper
Why Are Credential Stuffing Attacks On The Rise?

Malicious hackers have an abundance of attack methods at their disposal, ranging from the crude to the highly sophisticated. Credential stuffing is a type of brute force cyber attack that is increasing in popularity, and this article seeks to explain why.

Ronan Mahony's picture
Ronan Mahony
The Importance of Data Classification in a Post-GDPR World The Importance of Data Classification in a Post-GDPR World

Automated data classification can have a range of benefits. These include making it possible to organize and secure data for compliance purposes, assisting with deletion of data that is no longer needed, enabling monitoring and alerting, and reducing the cost of compliance.

Gilad David Maayan's picture
Gilad David Maayan
data cloud The Rise of Security Challenges for the Data Cloud

Data is getting dispersed across numerous databases, microservices, analytics tools, and pipelines. This results in increased security concerns that will soon become “top-of-mind” for engineering and security teams alike.

Manav Mital's picture
Manav Mital
Authentication Why use JSON Web Token (JWT) in Authentication

JSON Web Token (JWT) is an open, JSON-based standard for securely transmitting information between parties. In addition to secure information exchange, JWT could be used for authentication.

Deepak Vohra's picture
Deepak Vohra
Records Management Why You Should Automate Compliance

Compliance policy is one of those things most employees find boring and useless. However, for employers, staying compliant is one of the most crucial tasks and can have serious legal and financial repercussions if not done properly. But how can you make following compliance policy easier for your employees?

Alex Morgan's picture
Alex Morgan