Security
-
Enterprise Java
Token Authentication for Java Applications
Building Identity Management, including authentication and authorization? Try Stormpath! Our REST API and robust Java SDK support can eliminate your…
Read More » -
Software Development
Why you Should Attack Your Systems – Before “They” Do
You can’t hack and patch your way to a secure system. You will never be able to find all of…
Read More » -
Software Development
Secure the unsecured
A recent issue in my home country has surface this month regarding an information leak. Our “highly” trained officers says…
Read More » -
Software Development
Encryption is not Binary
If you ask someone if they require encryption on their device, first of all, you will likely get one of…
Read More » -
Core Java
Mutual Problems
The HTTPS protocol is the well-established standard for securing our connections. Understanding how this protocol works is not a problem…
Read More » -
Enterprise Java
Skip SSL certificate verification in Spring Rest Template
How to skip SSL certificate verification while using Spring Rest Template? Configure Rest Template so it uses Http Client to…
Read More » -
Software Development
TLS Client Authentication
I decided to do a prototype for an electronic identification scheme, so I investigated how to do TLS client authentication…
Read More » -
Enterprise Java
Theft-Proof Java EE – Securing Your Java EE Enterprise Applications
Øredev is just a couple of days away, and I was invited to give two presentations. One of them is…
Read More » -
Software Development
Why You Should Encrypt ALL Personally Identifiable Information (PII)
Many critics have pointed out that Ashley Madison should have encrypted all personally identifiable information (PII). The database contained sensitive…
Read More »