Best Practices for Secure Java Development in Regulated Industries

Kent Lautenschlager All Industries, Financial, Healthcare, Insurance, Java, Keyhole, Security, Spring, Videos Leave a Comment

Security is the cornerstone of software built for regulated industries. Applications must work properly and meet strict compliance standards while protecting sensitive information at every stage. In healthcare, finance, and other regulated fields, secure Java development ensures data is safe, trust is maintained, and legal obligations are met. At Keyhole Software, we help teams build security into every part of …

Implementing GitHub OAuth with NextAuth.js

Implementing GitHub OAuth with NextAuth.js

Bob Palmer Articles, JavaScript, Programming, Security Leave a Comment

In my last post, โ€œIntroduction to Web Apps with Next.jsโ€, we went through the steps of setting up a new Next.js project, customizing a landing page, and implementing a very simple web application. In this post, weโ€™ll implement an Open Authentication (OAuth) based Single Sign-On (SSO) API within Next.js using NextAuth.js. Weโ€™ll be using GitHub as our provider, but the steps here are very similar for other platforms, such as Google or Discord. This will allow us to place portions of our website behind a login screen, restricting access to certain content or APIs for anonymous visitors.

Software Bill of Materials (SBOM): A Recipe for Software Success

SBOMs: A Recipe for Software Success

Aaron Diffenderfer Articles, Manufacturing, Programming, Security, Supply Chain & Logistics Leave a Comment

While working with a client a few years ago, I was introduced to the concept of a Software Bill of Materials, colloquially known as an SBOM. It didnโ€™t take long before I recognized its immense value and importance in improving security and integrity in software development. Hopefully, over the next few minutes as you read this blog, youโ€™ll start to see that as well.

The topic of SBOMs has become more and more popular over the past several years and is increasingly critical in this technology-driven world. Weโ€™ve all heard of numerous enterprise-level data attacks, exposures, and leaks in recent years, and almost all are caused by some sort of security vulnerability. Many of these incidents could have been realized and possibly even mitigated before disaster struck if an SBOM had been in play.

What are Ways to Secure Your Microservices Architecture?

Jaime Niswonger All Industries, DevOps, Keyhole, Microservices, Security, Videos Leave a Comment

Attention: This article was published over 2 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.In today’s rapidly advancing digital landscape, securing microservices architecture is paramount to the success and resilience of modern organizations. At Keyhole Software, we understand …

GenAI in the Enterprise: Andrew Wilder, Chief Security Officer

Keyhole Software Artificial Intelligence, Gen AI In The Enterprise, Podcasts, Security Leave a Comment

Attention: This article was published over 2 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.In this episode of Generative AI in the Enterprise, Zach talks with Chief Security Officer, Andrew Wilder, about what he calls the “beauty and …