Blog

Trust, but Verify: The Missing Link in IAM

By | Date posted: May 18, 2017
Security-Breach

Identity and Access Management (IAM) is well-entrenched in enterprise and government infrastructures.

However, in our API-driven world, merely establishing a “trusted user” – e.g., a device or a person – and granting them access to information provides an incomplete security profile. Lacking the ability to inspect the bidirectional flow of data traversing our modern computing architectures, IAM technologies cannot answer the two most critical questions about trusted users:

What information are they bringing into the network?

What information are they removing from the network?

Read more

PSD2: An Open Concept in Banking Mandating the Use of APIs

By | Date posted: April 25, 2017
AAEAAQAAAAAAAAVmAAAAJDRjODFlMmI5LWNhMWUtNGNkOS04MDBhLTRjMGJhZjY5ODU0MQ

A revolution is occurring in European banking and APIs are leading the way.

Adopted in 2007, the Payment Services Directive (PSD) “provides the legal foundation for an EU single market for payments, to establish safer and more innovative payment services across the EU.” Legislated by the European Commission, the objective of the PSD “is to make cross-border payments as easy, efficient and secure as ‘national’ payments within a Member State.”

To accommodate the rapid rise of new online payment providers – third-party payment providers (TPPs) – the European Commission proposed a revision in 2013. Building on the PSD’s key principles, PSD2 was ‘born’ to make payments safer and more secure, enhance consumer protection, foster innovation and promote competition while ensuring a level playing field for all payment service providers.

In force since 2016, EU Member States must implement PSD2 by January 2018.

Read more

(Cloud)Flare Up: What you Need to Know about Ticketbleed

By | Date posted: March 2, 2017
Ticketbleed

As you’ve likely seen, last month, Cloudflare Engineer and crypto expert Filippo Valsorda discovered a software bug in F5 appliances. Named “Ticketbleed,” since it leaks SSL session identities like the famed Heartbleed, the vulnerability is in the transport layer security (TLS) stack of certain F5 products that allows a remote attacker to extract up to 31 bytes of uninitialized memory at a time. F5 has since issued a patch for the vulnerability, cataloged as CVE-2016-9244, but we decided to take a closer look.
Read more

How to Build a Secure OAth Solution in Less Than 5 Minutes

By | Date posted: December 8, 2016

In our last post, Protecting Against OAuth Hacks, our CTO, Jason Macy, discussed the latest reported OAuth 2.0 hack “One OAuth 2.0 hack, 1 Billion Android App Accounts potentially exposed“. In the post, we discussed how the Forum Sentry API Security Gateway implements OAuth end-to-end and is not vulnerable to this recently reported vulnerability.
Read more

Protecting Against OAuth Hacks

By | Date posted: November 18, 2016
shutterstock_279329882-680x400

In this latest reported OAuth 2.0 hack entitled “One OAuth 2.0 hack, 1 Billion Android App Accounts potentially exposed“, it has been discovered that:

“…A remote simple hack devised by a group of security researchers threatens an amazing number of Android and iOS apps. An attacker can use the technique to sign into any victim’s mobile app account without any knowledge of the legitimate user…”

Read more

Why API Management Caught Google’s Eye

By | Date posted: October 27, 2016
api

Anytime one of the world’s largest and most innovative brands puts more than a half-billion dollars into an M&A deal, the market sits up and takes notice. But, when the deal involves one of the key players in the API Management space, well, it takes on an added significance.

It has been a little more than a month since Apigee announced its acquisition by Google for $625 million. What does the event mean to the broader industry – for us here at Forum Systems?

Read more

SAML SSO 5 Security Check Points

By | Date posted: August 1, 2016
Three-Benefits-SAML

Security Assertion Markup Language, or SAML, provides numerous benefits to enterprises, organizations and governments. One of its greatest assets is Single Sign-On (SSO), the ability to enable users to securely access multiple applications with a single set of credentials, entered once. With SAML, users and organizations can conduct business faster and more efficiently by seamlessly accessing multiple applications on the same domain or on multiple domains.


 

Read more

Establishing Identity Federation: Combining Identity With Data Security

By | Date posted: July 7, 2016
investigacion-red-de-investigadores

Identity Federation – Internal and External Services, Internal and External Users

Establishing an identity and trust solution among computing systems in a network ecosystem is not new to information technology, what is new is the multiple factors enterprises must consider when implementing and finding a seamless solution to leverage access to not only existing identity repositories, legacy systems and more and more services moving to the cloud.
Read more