is now [learn more]

Lonti Blog

We publish content that will help improve your business. No fluffy blog posts here; just in-depth, information-packed articles with insights you can apply to your business straight away.

    Security

    Security Considerations in Data Mesh

    Explore the security considerations in a decentralized data mesh architecture. Learn about the challenges and best practices for maintaining data integrity and privacy in a distributed environment.
    Read More

    Security

    Securing the Data Lake: Data Security in a Data Lake

    Discover the multifaceted nature of data lake security and the challenges organizations face in protecting their valuable data. Learn about the intricate security measures and governance considerations needed to create a robust and resilient security architecture. Find out how authentication, authorization, data encryption, data masking, tokenization, monitoring, and auditing play a crucial role in securing data lakes. Explore the role of machine learning in data lake security and the future of data lake security in an evolving threat landscape.
    Read More

    Security

    Security Considerations in NoSQL Databases

    Learn about the unique security challenges and best practices for securing NoSQL databases. From authentication and encryption to patch management and compliance, discover how to protect your data effectively.
    Read More

    Security

    ELT Security Considerations

    Discover the importance of securing your ELT processes and mitigating risks in this comprehensive blog. Learn about vulnerabilities, real-world breaches, and essential security measures for your data-driven organization.
    Read More

    Security

    Application Integration Security

    Explore the complexities of securing application integration—from risk analysis to emerging technologies. Discover best practices and tools for a robust security posture.
    Read More

    API Management

    APIs under attack: how to prepare for and respond to breaches

    Learn how to secure your APIs from attacks with technical controls, incident response and disaster recovery plans. Don't wait until it's too late.
    Read More

    Security

    Are you really in charge of your digital identity?

    Discussions around digital identity could become complicated, simply because your digital identity could be shaped in various ways.
    Read More

    Cloud Computing

    Exploring the "edge" of the internet

    The industry is currently witnessing the rise of edge computing, where local devices that capture and store data are becoming more and more ubiquitous.
    Read More

    Microservices

    Intimidated by OAuth? Here’s why you shouldn’t be

    According to the OAuth website, 'OAuth is the industry-standard protocol for authorization', which focuses on simplicity while providing specific authorization flows for web applications.
    Read More