Security is the cornerstone of software built for regulated industries. Applications must work properly and meet strict compliance standards while protecting sensitive information at every stage. In healthcare, finance, and other regulated fields, secure Java development ensures data is safe, trust is maintained, and legal obligations are met. At Keyhole Software, we help teams build security into every part of …
Implementing GitHub OAuth with NextAuth.js
In my last post, โIntroduction to Web Apps with Next.jsโ, we went through the steps of setting up a new Next.js project, customizing a landing page, and implementing a very simple web application. In this post, weโll implement an Open Authentication (OAuth) based Single Sign-On (SSO) API within Next.js using NextAuth.js. Weโll be using GitHub as our provider, but the steps here are very similar for other platforms, such as Google or Discord. This will allow us to place portions of our website behind a login screen, restricting access to certain content or APIs for anonymous visitors.
SBOMs: A Recipe for Software Success
While working with a client a few years ago, I was introduced to the concept of a Software Bill of Materials, colloquially known as an SBOM. It didnโt take long before I recognized its immense value and importance in improving security and integrity in software development. Hopefully, over the next few minutes as you read this blog, youโll start to see that as well.
The topic of SBOMs has become more and more popular over the past several years and is increasingly critical in this technology-driven world. Weโve all heard of numerous enterprise-level data attacks, exposures, and leaks in recent years, and almost all are caused by some sort of security vulnerability. Many of these incidents could have been realized and possibly even mitigated before disaster struck if an SBOM had been in play.
What are Ways to Secure Your Microservices Architecture?
Attention: This article was published over 2 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.In today’s rapidly advancing digital landscape, securing microservices architecture is paramount to the success and resilience of modern organizations. At Keyhole Software, we understand …
GenAI in the Enterprise: Andrew Wilder, Chief Security Officer
Attention: This article was published over 2 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.In this episode of Generative AI in the Enterprise, Zach talks with Chief Security Officer, Andrew Wilder, about what he calls the “beauty and …


