Microsoft’s Dapr open-source project to help developers build cloud-native apps hits 1.0

Dapr, the Microsoft-incubated open-source project that aims to make it easier for developers to build event-driven, distributed cloud-native applications, hit its 1.0 milestone today, signifying the project’s readiness for production use cases. Microsoft launched the Distributed Application Runtime (that’s what “Dapr” stand for) back in October 2019. Since then, the project released 14 updates and […] Continue reading Microsoft’s Dapr open-source project to help developers build cloud-native apps hits 1.0

A single microservice (e.g., a spring boot jar) can be dependent on more than 100 libraries – how to ensure that none of these are compromised?

It took only one DLL, the SolarWinds.Orion.Core.BusinessLayer.dll, to bring so many companies to the knees. To be more precise, just a couple lines of code in the single DLL.
In today’s cloud-native application development, a single micros… Continue reading A single microservice (e.g., a spring boot jar) can be dependent on more than 100 libraries – how to ensure that none of these are compromised?

Container security is a priority, but who’s responsibility is it?

NeuVector released a survey that identifies current trends and challenges enterprises are grappling with as they increasingly turn to microservices architectures. Among respondents, 80% currently manage active container deployments and 87% are planning… Continue reading Container security is a priority, but who’s responsibility is it?

Protecting APIs & Securing Applications So Business Can Thrive

Radware partnered with Osterman Research to study recent developments in the field of application infrastructure and data security.
The post Protecting APIs & Securing Applications So Business Can Thrive appeared first on Radware Blog.
The post Pr… Continue reading Protecting APIs & Securing Applications So Business Can Thrive

Propagating user context between microservices secured with M2M JWT tokens

We have a current microservice architecture where we secure communication between microservices via Machine-To-Machine access tokens (these tokens are obtained using the Client Credentials grant flow).
We do this for all communications bet… Continue reading Propagating user context between microservices secured with M2M JWT tokens

The 10 Most Popular Blogs of 2020

In 2020, a pandemic gripped the globe, grinding life to a halt — and creating unprecedented opportunities for threat actors.
The post The 10 Most Popular Blogs of 2020 appeared first on Radware Blog.
The post The 10 Most Popular Blogs of 2020 appeare… Continue reading The 10 Most Popular Blogs of 2020

Monitoring Microservices on AWS with Thundra: Part II

This is part two of a three-part article series about monitoring microservices on AWS with Thundra. In the first part, we talked about monitoring a serverless architecture based on API Gateway, Lambda, S3, and SES.
The post Monitoring Microservice… Continue reading Monitoring Microservices on AWS with Thundra: Part II

How the Edge Improves Microservices

Microservice architecture has transformed the way we develop and operate our applications. Microservices aren’t a technology or a programming language. Instead, they create a structure for designing and building applications based on the idea that the … Continue reading How the Edge Improves Microservices