Data privacy vault: Securing sensitive data while navigating regulatory demands

In this Help Net Security interview, Jean-Charles Chemin, CEO of Legapass, provides insight into the correlation between maintaining customer trust and protecting sensitive customer data. He emphasizes how a data privacy vault can reinforce customer tr… Continue reading Data privacy vault: Securing sensitive data while navigating regulatory demands

Is there a problem to store user permissions in the database instead of in a external auth service?

In AWS Cognito we could define a role/permissions as a custom attribute in the user pool, but we could have a User table and a caching database and fetch roles each time the user does a request.
Of course, the first approach avoids an unne… Continue reading Is there a problem to store user permissions in the database instead of in a external auth service?

5 steps to building NSA-level access control for your app

Access control has become a main concern when it comes to developing secure web applications, and the NSA has a lot to say about it. Especially when it comes to the biggest access management pitfall developers make. In 2021 OWASP listed ‘Broken Access … Continue reading 5 steps to building NSA-level access control for your app

What is a proper way to prevent parameter tampering and to make parameter secure

I’m developing a HTTP web server. I’ve used HTTPS as the protocol between client and server but I know that HTTPS can’t prevent parameter tampering.
As we know, we can set parameters in URL, in HTTP header or in HTTP body. So clients could… Continue reading What is a proper way to prevent parameter tampering and to make parameter secure

I want to join our organisation AD with a recently acquired company’s AD for federated access. What are the security risks I should consider?

As per the title. What risks and controls should I consider? Are there any questions i need to ask the external party AD before setting up the ‘Trust’ between the 2 ADs?

Continue reading I want to join our organisation AD with a recently acquired company’s AD for federated access. What are the security risks I should consider?

A common user mistake can lead to compromised Okta login credentials

Logged failed logins into a company’s Okta domain could be used by threat actors to discover access credentials of valid accounts, Mitiga researchers have found. Those credentials can then be used log in to any of the organization’s platforms tha… Continue reading A common user mistake can lead to compromised Okta login credentials