Security
-
Software Development
How to Secure Elasticsearch and Kibana
Introduction Elasticsearch (ES) is a search engine based on Lucene. It provides a distributed, multitenant-capable, full-text search engine with an HTTP web interface and schema-free JSON documents. Kibana is an…
Read More » -
Software Development
The Rationale for Securing Big Data
This blog post is the first in a series based on the ebook The Six Elements of Securing Big Data…
Read More » -
Software Development
Securing NoSQL Databases: Use the Force
With stories of the thefts of millions of credit card records and sensitive employee data at some of the world’s…
Read More » -
Enterprise Java
Token Authentication for Java Applications
Building Identity Management, including authentication and authorization? Try Stormpath! Our REST API and robust Java SDK support can eliminate your…
Read More » -
Software Development
Why you Should Attack Your Systems – Before “They” Do
You can’t hack and patch your way to a secure system. You will never be able to find all of…
Read More » -
Software Development
Secure the unsecured
A recent issue in my home country has surface this month regarding an information leak. Our “highly” trained officers says…
Read More » -
Software Development
Encryption is not Binary
If you ask someone if they require encryption on their device, first of all, you will likely get one of…
Read More » -
Core Java
Mutual Problems
The HTTPS protocol is the well-established standard for securing our connections. Understanding how this protocol works is not a problem…
Read More » -
Enterprise Java
Skip SSL certificate verification in Spring Rest Template
How to skip SSL certificate verification while using Spring Rest Template? Configure Rest Template so it uses Http Client to…
Read More »