Security
-
Software Development
Protecting Sensitive Data
If you are building a service that stores sensitive data, your number one concern should be how to protect it.…
Read More » -
Enterprise Java
Using UAA OAuth2 authorization server – client and resource
In a previous post I had gone over how to bring up an OAuth2 authorization server using Cloud Foundry UAA project and…
Read More » -
Software Development
A Case For Native Smart Card Support in Browsers
A smart card is a device that holds a private key securely without letting it out of its storage. The…
Read More » -
Software Development
Fighting Advanced Persistent Security Threats with Anomaly Detection: Sometimes More is More
Does this sound disturbing? You try to reach a particular website only to find the site is down. But it’s…
Read More » -
Software Development
Bootstrapping an OAuth2 Authorization server using UAA
A quick way to get a robust OAuth2 server running in your local machine is to use the excellent Cloud Foundry…
Read More » -
Android Core
Tutorial: Build an Android Application with Secure User Authentication
Building Identity Management, including authentication and authorization? Try Stormpath! Our REST API and robust Java SDK support can eliminate your…
Read More » -
Software Development
How to Secure Elasticsearch and Kibana
Introduction Elasticsearch (ES) is a search engine based on Lucene. It provides a distributed, multitenant-capable, full-text search engine with an HTTP web interface and schema-free JSON documents. Kibana is an…
Read More » -
Software Development
The Rationale for Securing Big Data
This blog post is the first in a series based on the ebook The Six Elements of Securing Big Data…
Read More » -
Software Development
Securing NoSQL Databases: Use the Force
With stories of the thefts of millions of credit card records and sensitive employee data at some of the world’s…
Read More »