Lonti Blog
We publish content that will help improve your business. No fluffy blog posts here; just in-depth, information-packed articles with insights you can apply to your business straight away.
Security
Security Considerations in Data Mesh
Explore the security considerations in a decentralized data mesh architecture. Learn about the challenges and best practices for maintaining data integrity and privacy in a distributed environment.
Read More
Security
Securing the Data Lake: Data Security in a Data Lake
Discover the multifaceted nature of data lake security and the challenges organizations face in protecting their valuable data. Learn about the intricate security measures and governance considerations needed to create a robust and resilient security architecture. Find out how authentication, authorization, data encryption, data masking, tokenization, monitoring, and auditing play a crucial role in securing data lakes. Explore the role of machine learning in data lake security and the future of data lake security in an evolving threat landscape.
Read More
Security
Security Considerations in NoSQL Databases
Learn about the unique security challenges and best practices for securing NoSQL databases. From authentication and encryption to patch management and compliance, discover how to protect your data effectively.
Read More
Security
ELT Security Considerations
Discover the importance of securing your ELT processes and mitigating risks in this comprehensive blog. Learn about vulnerabilities, real-world breaches, and essential security measures for your data-driven organization.
Read More
Security
Application Integration Security
Explore the complexities of securing application integration—from risk analysis to emerging technologies. Discover best practices and tools for a robust security posture.
Read More
API Management
APIs under attack: how to prepare for and respond to breaches
Learn how to secure your APIs from attacks with technical controls, incident response and disaster recovery plans. Don't wait until it's too late.
Read More
Security
Are you really in charge of your digital identity?
Discussions around digital identity could become complicated, simply because your digital identity could be shaped in various ways.
Read More
Cloud Computing
Exploring the "edge" of the internet
The industry is currently witnessing the rise of edge computing, where local devices that capture and store data are becoming more and more ubiquitous.
Read More
Microservices
Intimidated by OAuth? Here’s why you shouldn’t be
According to the OAuth website, 'OAuth is the industry-standard protocol for authorization', which focuses on simplicity while providing specific authorization flows for web applications.
Read More