Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How the Parkinson's Foundation Stays Secure With a Small IT Staff

At the Parkinson’s Foundation, we believe data security is a team sport, which is why we rely on everybody in our organization to follow best practices for protecting our content. Like most organizations, we have several layers of sensitive content, including some of our accounting and marketing files.

How Spotify uses Snyk to secure the SDLC

Spotify’s engineering team recently published a blog discussing their use of Snyk to maintain security testing in the SDLC. The following is a recap of that blog written by Engineering Manager, Edina Muminovic. Spotify, a company known for employing thousands of world-class developers, needed to redraw its software development lifecycle, or SDLC.

How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money

Onna Technologies, a data centralization software company, integrates security across every facet of their development process by using Snyk and Sysdig. We recently sat down with Onna’s Brent Neal (Director of Security), Mike Hoffman (Lead Security Engineer), and Andrew Leeb (Senior Software Engineer) to discuss data protection and compliance, cloud security priorities, and the benefits using Snyk and Sysdig for complete end-to-end container security.

How SIM card registration with ID Biometrics is revolutionizing telecom security in Lesotho, Namibia

The southern African nations of Lesotho and Namibia have newly begun programs for users to re-register their SIM cards with their biometrics and digital IDs, adding them to the list of newly joined countries adapting to the new norms in Africa. South Africa is also set to schedule biometric SIM registration, with further plans to push ‘ID4Africa’ as a type of incentive-based identity enrollment approach for governments.

MasterCard allows Digital ID Verification of patients on Mobile Phones.

Seamless and smooth is the new mantra that every company is trying to achieve in their operation and client’s dealings. Healthcare services are adapting fast to this mantra, and the master card is the new revolution keeping the industry in sync with high user experience through the implementation of ID verification. It’s the digital age; almost everything in this world now operates with the help of AI and its different realms.

Collaborating on Access Control Policies with Open Policy Agent

Zendesk Engineering consists of many teams that own a large number of different domains, ranging from engineering teams that built internal services to teams that work on our various product offerings. One concern that these teams have in common is controlling access to their APIs via fine-grained policies. Some APIs are only available to admins, others to users with a specific set of permissions and some APIs restrict access based on attributes of the data being accessed.

GBBN makes end users happier and more productive with Egnyte rollout

GBBN Architects successfully rolled out Egnyte’s file storage and collaboration platform to improve upon aging file server workflows. Leveraging Egnyte’s easy to use link-based access with robust security tools, GBBN has made their distributed design teams more effective while minimizing administrative burdens on the IT organization.

How Egnyte Handles API Mocking: A Mirage.js Case Study

Mocking API requests for local development purposes or tests can be really cumbersome for frontend developers. The payload can be very large, identifiers of related entities must match, and besides that, sometimes we would like to get a completely different response depending on a use case. How do you avoid the extra work and avoid ending up with a mass of a half-duplicated code? At Egnyte, we cope with this challenge by using Mirage.js library.

Improving developer experience with security tools at Pinterest

Using open source libraries securely is an ongoing priority at large organizations. One big challenge is integrating security tools into the developer workflow — and setting up a system that prioritizes vulnerability fixes — without overwhelming developers. But what does a successful approach look like?