What are Ways to Secure Your Microservices Architecture?

Keyhole Software DevOps, Keyhole, Microservices, Security, Video Leave a Comment

In today’s rapidly advancing digital landscape, securing microservices architecture is paramount to the success and resilience of modern organizations. At Keyhole Software, we understand the critical imperatives of protecting against unauthorized access and safeguarding sensitive data. This guide explores key strategies to fortify your microservices architecture’s security, highlighting the comprehensive services we offer to help you navigate and implement these …

Navigating the Maze of Authentication Options for Solo Devs and Small Teams (header)

Navigating the Maze of Authentication Options: A Solo Developer’s Guide

Andy Link Programming, Security Leave a Comment

In web development, choosing the right authentication strategy is a pivotal decision, especially for solo developers or small teams working with limited resources. After extensive research, I’ve adopted a hybrid approach that combines the security and ease of 3rd party services like Google and Microsoft with the control of an in-house solution.

This hybrid approach addresses my core concerns: cost, control, and user convenience while keeping the in-house method at the forefront. As we explore this topic, I’ll share the considerations and insights that shaped my strategy, aiming to guide you toward the authentication system that best fits your project’s unique demands.

What are the Common Software Security Issues & How Do I Prevent Them?

Keyhole Software Keyhole, Security, Video 1 Comment

In the world of software development, addressing the common software security issues and how you can prevent them is crucial. At Keyhole, we understand the importance of prioritizing security right from the project’s inception. This approach is not just a recommendation but a necessity in today’s digital landscape. Integrating security measures from the start significantly reduces the risk of encountering …

What are the Common Security Issues in Cloud Computing for Businesses?

Keyhole Software Cloud, Keyhole, Security, Video Leave a Comment

As an expert-driven software development and consulting firm, we prioritize knowledge sharing, client-focused delivery, and a commitment to modern technology solutions. In this spirit, we address a critical aspect of today’s business landscape: common security issues in cloud computing for businesses. This topic, often neglected or misunderstood, can be the difference between a thriving enterprise and a cautionary tale. Preventing …

FHIR APIs

Part 1: Creating an FHIR API – Google or Azure?

Zach Gardner Cloud, Creating an FHIR API, Security, Tutorial Leave a Comment

Data interoperability is one of the hardest problems in Healthcare IT. The most popular approach is to exchange HL7v2 messages between systems. These pipe-delimited messages are difficult to read by a human and often need additional customizations between implementations.

The next major paradigm shift is towards FHIR (Fast Healthcare Interoperability Resources), a JSON-based standard that is evolving ahead of the needs of the industry. Cloud vendors like Microsoft, Amazon, and Google are trying to lay their claim to be the one-stop shop for healthcare on the cloud.

This blog is part of a 4 part series diving into an actual use case I recently encountered while working with a client. I had to stand up an FHIR repository/API for 2+ million patients that could be used by hundreds of users every day, as well as countless background processes.