As promised in my last blog “Big Data, API, and IoT …..Newer technologies protected by older security” here is a deep dive on Big Data security and how to effortlessly secure Big Data effectively. Like many other open source models, Hadoop has followed a path that hasn’t focused much on security. In order to effectively use Big Data, it needs to be secured properly.
Secret API Keys add a layer of security to APIs and who can access what functions, but a simple flaw in the common implementation in GitHub leaves many API Keys exposed to external developers. This tutorial by Moshe Shaham explains this error, as well as how to leverage it to find API keys.
Developers are opting for phone verification over email verification as it is effective in reducing spam accounts. Adding phone verification to your app doesn't need to be complex. This tutorial shows how to use Nexmo Verify SDK for iOS in a "To-Do List" application that uses Parse for a backend.