Category Archives: Application Security

API Led Connectivity

Here is a well-known fact: Technology has become a part of every aspect of our lives. We are all connected in some way. We live in a highly connected world. Every day we create humongous amount of data, as individuals, businesses or machines. And we do so with the help of numerous devices and applications. As consumers, we keep interacting with new technologies that change the way we live. We want the systems to be powerful and want them to work together seamlessly. We expect the organizations to deliver these functionalities faster than ever. To meet this, organizations are presented with several specialized tools to meet the customer expectations.

Point-to-Point Integration

Karan-1

Continue reading

Posted in Application Architecture, Application Security, salesforce connectors. Tagged with , , .

Software as a Service (SaaS) takes root as Multi-Billion Dollar industry

According to SaaS Mag, with increased adoption specially of Salesforce, Software as a Service industry, is on a rise and is expected to be more than $130 billion industry by 2020. SaaS is referred to as a software distribution model in which a service provider hosts the application and makes it available for the customers over the internet. There are three main categories of cloud computing:

  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)

SaaS is similar to ASP (Application Service Provider) and on demand computing software delivery models.  The SaaS model where the provider hosts the client’s software and delivers it over the internet to an approved set of users is like ASP. The on-demand software model of SaaS refers when the provider gives clients network-based access to software. The source code of the application is same, and it is specifically created for SaaS distribution. When the new functionalities are to be rolled out, it is done for all users. Data storage again depends upon the type of agreement the provider has with the customers. Customers can opt data storage locally, in the cloud or both locally and in the cloud. Organizations can also integrate other software with SaaS applications using APIs.

Continue reading

Posted in Application Architecture, Application Security.

Data Breach

A data breach, or data leak, is a security event in which protected data is accessed by or disclosed to unauthorized viewers. A data breach is different from data loss, which is when data can be no longer accessed because of hardware failure, deletion or other cause. Protected data can include information about individual customers, or employees, such as personally identifiable information (PII), personal health information, payment card information and Social Security numbers. It can also include corporate information or intellectual property (IP), such as trade secrets, details about manufacturing processes, supplier and customer data, information about mergers and acquisitions, or data about lawsuits or other litigation.

Data breaches are not always intentional. Users can accidentally send protected data to the wrong email address or upload it to the wrong share; in fact, mistakes account for 17% of breaches, according to the well-known Verizon’s 2018 Data breach investigation Report. But the report found that most breaches are deliberate and financially motivated. While different methods are used to gain access to sensitive data, 28% of breaches involve insiders, according to the Verizon report.

Continue reading

Posted in Application Security, Data Security, Ethical Hacking. Tagged with , , .