01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

OAuth 1.0 to OAuth 2.0, or increasing regulatory requirements <strong>for</strong> multi-factor authentication (MFA), the<br />

increased compliance workload pulls valuable time away from building a product. Increasingly, plat<strong>for</strong>ms<br />

have recognized this burden and are investing in building out-of-the-box tools required to reduce the load.<br />

Underpinning this is extensive documentation, education and support <strong>for</strong> developers who need help or<br />

are interested in taking a deeper dive.<br />

An example is the large range of identity tools <strong>for</strong> user access and credentials that make signing-up and<br />

signing-into apps easier <strong>for</strong> customers, like Single-Sign On using Xero, Okta or Google. Developers can<br />

leverage existing customer details within the security of the plat<strong>for</strong>m as part of their onboarding and login<br />

flow. Additionally, some plat<strong>for</strong>ms have already established complementary MFA tools as part of their<br />

login flow. This is especially useful <strong>for</strong> developers wanting to add additional security protocols <strong>for</strong> their<br />

product, or those operating or wanting to operate in countries like Australia where MFA is mandatory <strong>for</strong><br />

digital service providers. Research from Verizon shows that MFA can prevent up to 80% of data breaches<br />

making it one of the most effective methods to protect customer data, especially if their credentials are<br />

compromised.<br />

Point-of-sale and payments plat<strong>for</strong>ms like Square, Stripe and Shopify all offer secure and easily<br />

integrated checkout and payments solutions so developers don’t need to build their own. This helps avoid<br />

the increased compliance, risk and security burdens that come with directly managing payments - a highly<br />

regulated global industry.<br />

Plat<strong>for</strong>ms also constantly monitor the operation and security of their APIs with dedicated teams and tools.<br />

Issues or unusual behavior, such as sudden spikes in request volumes or webhooks errors, can be<br />

immediately flagged <strong>for</strong> investigation, enabling the plat<strong>for</strong>ms to move quickly in response and notify<br />

developers. Where there may be a product or feature slowness or outage, this also helps both parties<br />

manage the customer experience <strong>for</strong> end-users with status updates or a quick resolution.<br />

Reducing burden and barriers to entry <strong>for</strong> developers encourages innovation and experimentation in a<br />

plat<strong>for</strong>m. With developers being supported by cybersecurity features at the plat<strong>for</strong>m level, their time is<br />

freed up to focus on doing what they do best - solving problems and innovating. This ultimately benefits<br />

end-user customers who can use the plat<strong>for</strong>m and choose associated integrations with greater<br />

confidence.<br />

Time to focus on the basics<br />

Developers and end-users both benefit from the work that cloud plat<strong>for</strong>ms do in cybersecurity. By<br />

prioritizing identifying and working with plat<strong>for</strong>ms that provide a secure environment, developers are<br />

prioritizing the safety of the data of both parties. <strong>The</strong>y’re also freeing up resources to spend on building<br />

out their products and solutions, enabling time to be spent on developing features that customers want.<br />

But even with plat<strong>for</strong>ms taking a lot of the security burden off of developers, it’s not permission to be idle<br />

when creating solutions. <strong>The</strong>re are many other basic security practices and processes that should<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 131<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!