is now [learn more]

Lonti Blog

We publish content that will help improve your business. No fluffy blog posts here; just in-depth, information-packed articles with insights you can apply to your business straight away.

Security

Security Considerations in Data Mesh

Explore the security considerations in a decentralized data mesh architecture. Learn about the challenges and best practices for maintaining data integrity and privacy in a distributed environment.
Read More

Security

Securing the Data Lake: Data Security in a Data Lake

Discover the multifaceted nature of data lake security and the challenges organizations face in protecting their valuable data. Learn about the intricate security measures and governance considerations needed to create a robust and resilient security architecture. Find out how authentication, authorization, data encryption, data masking, tokenization, monitoring, and auditing play a crucial role in securing data lakes. Explore the role of machine learning in data lake security and the future of data lake security in an evolving threat landscape.
Read More

Security

Security Considerations in NoSQL Databases

Learn about the unique security challenges and best practices for securing NoSQL databases. From authentication and encryption to patch management and compliance, discover how to protect your data effectively.
Read More

Security

ELT Security Considerations

Discover the importance of securing your ELT processes and mitigating risks in this comprehensive blog. Learn about vulnerabilities, real-world breaches, and essential security measures for your data-driven organization.
Read More

Security

Application Integration Security

Explore the complexities of securing application integration—from risk analysis to emerging technologies. Discover best practices and tools for a robust security posture.
Read More

API Management

APIs under attack: how to prepare for and respond to breaches

Learn how to secure your APIs from attacks with technical controls, incident response and disaster recovery plans. Don't wait until it's too late.
Read More
Taking charge of your digital identity

Security

Are you really in charge of your digital identity?

Discussions around digital identity could become complicated, simply because your digital identity could be shaped in various ways.
Read More
Exploring the

Cloud Computing

Exploring the "edge" of the internet

The industry is currently witnessing the rise of edge computing, where local devices that capture and store data are becoming more and more ubiquitous.
Read More
Intimidated by OAuth

Microservices

Intimidated by OAuth? Here’s why you shouldn’t be

According to the OAuth website, 'OAuth is the industry-standard protocol for authorization', which focuses on simplicity while providing specific authorization flows for web applications.
Read More