Deutsche Bank London helped create a new application self-defense tool to lock down and... more »
Find out about the new Bash vulnerability, Shellshock and how to make sure you aren't vulnerable.
Remember Heartbleed? If you believe the hype today, Shellshock is in that league and with an... more »
You want to check an API to ensure that it’s secure, but just how do you think like a bad guy... more »
Hierarchical roles offer a lot more flexibility than simple roles. See how to integrate these... more »
Revamping WSO2 API Manager Key Management Architecture around Open Standards
The shellshock/Bash bug has been in the news a lot recently and it seemed like a great... more »
The most recent Shellshock, a vulnerability in the popular shell bash, got me to evaluate... more »
my arguments, no bullshit, just the facts ...
Realistically, though, would outlawing encryption even be practical in this day and age? Look... more »
Self-issued OAuth Access Tokens
It’s so easy to overcome the restrictions Snapchat sets. With just a little skill, it’s... more »
A discussion on the pros and cons of cloud platforms and on-premise environments.
Sniff your smartphones wifi communication using Linux and Wireshark by putting a wireless... more »
WSO2 Identity Server 5.0.0 Authentication Framework
Pivotal data science and security expert, Derek Lin, has considerable experience in the areas... more »
How can we try to figure out where the weak points are in our security? How can we find the... more »
WSO2 Identity Server 5.0.0 Provisioning Framework
Today a new SSL v3 security vulnerability is released by Google and it affects all products... more »
JSON Web Token (JWT) is a useful standard becoming more prevalent. This post covers what JWTs... more »
In order not to let cyber hackers damage your project databases, it is essential to know the... more »
It’s six days since I wrote about Shellshock and the response has been massive. There’s... more »
Consequently, even though my light scan found only 3000 results, this thing is clearly... more »
Cyber security can be a difficult task to tackle since the issue is so complicated, with many... more »
Identity Anti-patterns: Federation Silos and Spaghetti Identity
Show more links
Advertising - Terms of Service - Privacy - © 1997-2014, DZone, Inc.