Learn how to build a secure SPA using Spring Boot and OAuth while using a Spring Boot starter to get additional support for validation and authority mapping.
If you haven't had a chance to explore Azure's Network Watcher, including the Network Security Group Flow logs, here's how to get the ELK integrated for analysis.
What should a DBA do other than wait for new edicts from on high — especially when data held by the IT department is a business asset and data governance is the responsibility of multiple people?
Single Sign-On (SSO), has become a very popular method of authentication. Read on to learn about the two different methods available for implementing SSO.
Buckle up for a 30-minute talk about the current state of IoT data and a demo that tackles MQTT, TLS, load balancing, session persistence, and plenty more.