Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Security Roundup: Cure Your AppSec Woes With an Encryption Perscription

DZone's Guide to

Security Roundup: Cure Your AppSec Woes With an Encryption Perscription

Welcome to this month's roundup! In this post, we take a look at some of the best DZone articles on encryption, and how to implement it in your app.

· Security Zone ·
Free Resource

Discover how to provide active runtime protection for your web applications from known and unknown vulnerabilities including Remote Code Execution Attacks.

Welcome to this month's edition of the Security Roundup! Last time, we looked at JWT security, and how to integrate JWT tokens into your application. In today's post, we take a look at what the DZone community is doing with encryption, including tutorials on getting started with this complex process, some libraries that help to reduce the complexity of encryption, encrypting an Elasticsearch application, and more. 

And, as a quick side note, if you're interested in writing for DZone, but don't have a topic in mind, come check out our Bounty Board, where you can win prizes for providing great content, and our Writer's Zone which has plenty of prompts, tips, and tricks! 

P.S. Anybody get the SNL reference below? 


I've Got a Fever, and the Only Perscription, Is Encryption 

  1. In Encryption We Trust! A Tutorial by Tasos Martidis. In this article, we cover the basics of encryption and build a simple encryption protocol to test out the theories presented here.

  2. Password Encryption and Decryption Using jBCrypt by Dhiraj Ray. Looking to create a great password for your sensitive files? Read on to learn how to generate a random password and how to hash that password.

  3. A Gentle Introduction to Asymmetric Encryption and SSL Certificates by Wilfred Nilsen. In order to understand SSL certificates, we need to understand the fundamentals of asymmetric key establishment, an important feature in digital certificates.

  4. Elasticsearch Security: Authentication, Encryption, and Backup by Stefan Thies. In this post, we take a quick look at how you can increase the security you have with your Elasticsearch instances. Read on for details!

  5. Mule Message Encryption With JCE by Anupam Gogoi. In this post, we'll learn how to ensure our messages in Mule are encrypted using the Anypoint platform and the Java Cryptography Extension. And, if you like this post, check out Anupam's follow up article, Mule Message Encryption With JCE Keystore.


Recent Security Publications

  • REST API Security by Guy Levin. API security is the single biggest challenge organizations want to see solved in the years ahead. Download this Refcard to gain a better understanding of REST APIs, authentication types, and other aspects of security.

  • Docker Security by Knox Anderson. This Refcard will lay out the basics of the container security challenge, give you hands-on experience with basic security options, and also spell out some more advanced workflows. We split container security into three sections covering what to do at each step of your container security lifecycle.

Find out how Waratek’s award-winning application security platform can improve the security of your new and legacy applications and platforms with no false positives, code changes or slowing your application.

Topics:
security ,encryption ,appsec ,cybersecurity

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}