5 bad practices that lead to insecure APIs in cloud computing

softwarequality article 015
Public cloud APIs unlock numerous, productive possibilities for developers. These interfaces bring core features to applications and connect apps and programs to external services. Properly integrated APIs benefit all users and bolster a service's value proposition on the software market. That said, insecure APIs in cloud computing can expose environments to malicious threats. Businesses have a responsibility to provide safe products, but sometimes mistakes lead to security issues. Here are just a few examples of oversights that can lead to trouble: failure to vet APIs, or perform a thorough code review prior to implementation; developers not configuring their APIs properly; and a lack of obfuscation with business logic and endpoints. These three cases hardly scratch the surface when evaluating common API vulnerabilities. Below,...

Digital transformation and edge computing: 7 best practices

cio data analyze
Digital transformation and edge computing are not mutually exclusive approaches. Quite the contrary, say edge experts. Edge “is an enabler or accelerator technology” for digital transformation, says Vishnu Andhare, senior consultant with technology research and advisory firm ISG. That’s especially true for Internet of Things (IoT) initiatives which are part of digital transformation efforts. The last mile of these projects ­– which are essentially distributed computing defined – used to be a bottleneck. However, when IT organizations apply edge approaches, IoT can be a real game changer. By distributing analytics and processing closer to where data is generated, enterprises can realize real-time use cases while minimizing communications costs. [ Get a shareable primer: How to explain edge computing in plain English.]  “The...