458 Results for:TLS

  • Sort by: 

Trousseau turns up truss torque for Kubernetes

By Adrian Bridgwater 14 Feb 2022

Protecting access to sensitive data in Kubernetes is complicated.  Some would go far enough to say that the security layer in Kubernetes is not optimal. Named after the French for ‘truss’ or ‘turn ... Read More

Jetstack joyride: open source cert-manager ‘graduates’ to V1

By Adrian Bridgwater 02 Sep 2020

Open source company Jetstack was acquired by Venafi (a certificate and key management for machine-to-machine connections specialist vendor) back in May of 2020. So was that good for the open ... Read More

Choosing between proxy vs. API CASB deployment modes

By Ed Moyle 17 Nov 2020

Curious how to choose the right CASB deployment mode for your organization? Before you buy, compare how proxy vs. API CASB architectures work to secure SaaS applications. Read More

4 essential steps to IoT device development

14 Oct 2022

For a successful IoT device, companies must avoid designing for the short term, outdated workflows, untested feature rollouts and retroactive security measures. Read More

Istio service mesh security benefits microservices, developers

By Ed Moyle 17 Jun 2020

Learn more about Istio service mesh security features and how the open source technology can enable developers to better run, control and secure a distributed microservices architecture. Read More

5 fundamental strategies for REST API authentication

By Priyank Gupta 23 May 2022

There are various authentication methods for REST APIs, ranging from basic credentials and token encryption to complex, multilayered access control and permissions validation. Read More

What are the top secure data transmission methods?

30 Sep 2020

Safe information transfer is a must for modern organizations, but not all secure data transmission methods are equal. Explore your secure data transfer options in this tip. Read More

Log4Shell: Why aren't we taking the security of the internet seriously?

By Cliff Saran 15 Dec 2021

To be caught out once may be an oversight, and lessons can be learned. But twice over a seven year timespan, shows a laissez faire attitude to the stability of the internet. In 2014, Heartbleed ... Read More

Low-code API management tool fights complexity, with caveats

By Stephanie Glen 10 Nov 2022

A new low-code API management tool could bring benefits such as increased speed, fewer coding errors and wider accessibility. But it must prove itself in the market. Read More

12 API security best practices to protect your business

By Michael Cobb 18 Oct 2022

As with any software development cycle, API security must be built in from the start. Follow these guidelines to design, deploy and protect your APIs. Read More