The Evolution of Security in Containerized Environments

In recent years, containers have become a staple in modern IT infrastructures. They provide extreme flexibility and efficiency in deploying applications. Yet, as containerization has grown in popularity, so has the need ...
From DAST to dawn: why fuzzing is better solution | Code Intelligence

From DAST to dawn: why fuzzing is better solution | Code Intelligence

Security testing allows you to evaluate the robustness of applications and systems and identify potential weaknesses that attackers may exploit. DAST and fuzzing are two popular, important, and proven security testing methods ...
Top 18 AI-Powered Software Testing Tools in 2023

Top 18 AI-Powered Software Testing Tools in 2023

| | AI, DevOps Security
The impact of AI tools on software development is starting to make itself felt. As the productivity of developers increases, so does the necessity for software testing. Luckily, AI is also seeing ...

GitLab Security Patches: Safeguarding Your Data

GitLab recently released critical security upgrades in order to improve the security of its widely used open-source code repository and DevOps collaborative software development platform. These GitLab security patches are intended to ...
Aligning Cloudentity Components with XACML Terminology

Aligning Cloudentity Components with XACML Terminology

Cloudentity is frequently asked how our components and features align with those of the legacy XACML (eXtensible Access Control Markup Language), including Policy Administration Points (PAP), Policy Decision Points (PDP), Policy Information ...
Build a GraphQL client application to consume protected GraphQL API resources

Build a GraphQL client application to consume protected GraphQL API resources

This article is part 3 of our GraphQL application protection series. In this article, we will build a GraphQL client that is capable of invoking GraphQL API calls, obtain authorized access tokens ...
Build and secure a GraphQL based application with Cloudentity authorization platform

Build and secure a GraphQL based application with Cloudentity authorization platform

This article is part 2 of our GraphQL application protection series. In this article, we will build a GraphQL API server and protect its resources with externalized policies administered in the Cloudentity ...
Externalized Authorization for GraphQL

Externalized Authorization for GraphQL

This article is the first part of a series to explore usage of the Cloudentity authorization platform for externalized GraphQL runtime authorization along with policy based access controls for GraphQL native constructs ...
Identity and Authorization At Cloud Scale

Identity and Authorization At Cloud Scale

Identity and Authorization at Cloud Scale Scalability has long been a thorn in the side of IAM limiting both the agility of the business and the capabilities of developers creating next-gen services ...
web application security banner

Can DevSecOps Covers Holes Made by Digital Transformation?

Digital transformation in most organizations is gathering steam post the COVID-19 pandemic. Every company is shifting their business towards the online portal in line with the need of the hour.. The post ...