API Security

Featured image for Making Dynamic Authorization an Essential Pillar in Federal Government Zero Trust Architecture Strategies

Making Dynamic Authorization an Essential Pillar in Federal Government Zero Trust Architecture Strategies

Author: Brook Lovatt, Chief Product Officer of Cloudentity The government’s focus on Zero Trust has risen in the past year, as shown by the Biden Administration's May 2021 and January 2022 executive orders and the Cybersecurity and Infrastructure Security Agency’s (CISA) Zero Trust Maturity Model. CISA’s Zero Trust Maturity Model is one of many roadmaps...
Read More
Featured image for Aligning Cloudentity Components with XACML Terminology

Aligning Cloudentity Components with XACML Terminology

Cloudentity is frequently asked how our components and features align with those of the legacy XACML (eXtensible Access Control Markup Language), including Policy Administration Points (PAP), Policy Decision Points (PDP), Policy Information Points (PIP), and Policy Enforcement Points (PEP). In this article, we will describe what the Cloudentity components are and how they align with...
Read More
Featured image for Securing partner API integrations with OAuth mTLS

Securing partner API integrations with OAuth mTLS

Securing partner API integrations with OAuth mTLS API access using token-based architectures is already popular, and the authorization and governance of the minted tokens for access becomes very critical for APIs, which exposes data for partner integrations outside of the organization itself. This is exactly where we can utilize the OAuth mTLS specification along with...
Read More
Featured image for The Perimeter has Disappeared: Why Zero Trust and IAM are Essential to Secure the Modern Enterprise

The Perimeter has Disappeared: Why Zero Trust and IAM are Essential to Secure the Modern Enterprise

In the conventional, on-premises IT infrastructure, organizations worked within the boundaries of their well-defined enterprise network perimeter. In this setting, on-premises security tools like virtual private networks (VPNs) were mostly sufficient to secure users and devices within the perimeter walls. However, with the increase in remote work and cloud computing, organizations are leveraging various apps...
Read More
Featured image for Cloudentity Named Winner in the Globee Awards 18th Annual Cyber Security Global Excellence Awards

Cloudentity Named Winner in the Globee Awards 18th Annual Cyber Security Global Excellence Awards

Cloudentity Named Winner in the Globee Awards 18th Annual Cyber Security Global Excellence Awards We’re excited to share that the Globee Awards have named Cloudentity a winner in the Application Programming Interface (API) Management and Security category in the 18th Annual 2022 Cyber Security Global Excellence Awards. These prestigious global awards recognize cyber security and...
Read More
Featured image for Build a GraphQL client application to consume protected GraphQL API resources

Build a GraphQL client application to consume protected GraphQL API resources

This article is part 3 of our GraphQL application protection series. In this article, we will build a GraphQL client that is capable of invoking GraphQL API calls, obtain authorized access tokens from a Cloudentity authorization server and send the authorization token to underlying GraphQL services. Part 1: Externalized authorization for GraphQL using the Cloudentity...
Read More
Featured image for Protecting GraphQL applications through authorization and consent

Protecting GraphQL applications through authorization and consent

This article is part 2 of our GraphQL application protection series. In this article, we will build a GraphQL API server and protect its resources with externalized policies administered in the Cloudentity Authorization SaaS platform. We will also protect the GraphQL API endpoint data with a local policy enforcement/decision point for the app deployed within...
Read More
Featured image for Cloudentity Wins Cybersecurity Excellence Award in API Security

Cloudentity Wins Cybersecurity Excellence Award in API Security

We’re excited to share that Cloudentity has been named a Silver Winner in the API Security category for the 2022 Cybersecurity Excellence Awards! The Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security. With over 700 entries this year, we’re honored to be selected as a winner. Specifically,...
Read More
Featured image for Externalized Authorization for GraphQL

Externalized Authorization for GraphQL

This article is the first part of a series to explore usage of the Cloudentity authorization platform for externalized GraphQL runtime authorization along with policy based access controls for GraphQL native constructs. Modern applications require runtime and flexible authorization controls to manage the security and risk of data exposed using technologies like GraphQL to various...
Read More
Featured image for What is Open Banking?

What is Open Banking?

Open Banking is the practice of consumer-initiated, secured and explicitly approved data sharing among financial institutions, investment companies, and third-party financial service providers. Privacy & Data sharing benefits both customers and banks. Customers get better, faster, and more secure access to services offering financial transparency and streamlined journeys, from account setup and payments to financial...
Read More
Featured image for Identity and Authorization At Cloud Scale

Identity and Authorization At Cloud Scale

The future has a lot to answer for. For decades we’ve been promised super-cool inventions that we still haven’t received - flying cars, jetpacks and IAM platforms that provide security, scale and manageability- all with wrapped up with 21st century automation. George Jetson’s job had two settings ("Start" & "Stop") and the computer did the...
Read More