Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

How to fix Error 429: Too Many Requests

Your application is running smoothly. Tests have passed. Suddenly you start to see 429 error responses from an API. As the name implies, you have made too many requests and your application has been rate limited. The 429 (Too Many Requests) error is an HTTP status code that often occurs when you've hit a request limitation of an API.

Security Audit Results for Our Open Source Products

We now live in an era where the security of all layers of the software stack is immensely important, and simply open sourcing a code base is not enough to ensure that security vulnerabilities surface and are addressed. At Gravitational, we see it as a necessity to engage a third party that specializes in acting as an adversary, and provide an independent analysis of our sources.

Open Source Organizational Culture

I am not an engineer. I’m a director of human resources. I don’t work in a technical space, but the concept of open source is fascinating to me as it applies to organizational culture. A company like Gravitational that has intentionally chosen open source as a foundation for our work makes not only a technical decision, but a cultural one. We’re finding that employees and candidates care deeply and appreciate our choice. Open source is a big deal for us.

The Top Node.js HTTP Libraries in 2020

Out of the box, Node.js offers the http library for making requests, but it isn't particularly user friendly and requires some customization before it can be easily used. As a result, a large ecosystem of third-party libraries have emerged to make AJAX and HTTP requests easier. Some offer cross-platform (browser and Node.js) support, while others focus on bundle size or developer experience. With some many options, how do you choose?

Red Teaming for Blue Teamers: A Practical Approach Using Open Source Tools

For the majority of people in the information security world, the act of offensive hacking is something they are tasked with protecting against but have little ability to do themselves. That is like asking a professional boxer to enter the ring without knowing how to throw a punch. Sure, you may be able to get in and last a few rounds, but eventually, a formidable opponent will wear you down and knock you out.

INETCO Insight Technical Overview - Real-time Data Acquisition, Transaction-level Monitoring and Adaptive Machine Learning Capabilities

This whitepaper discusses the INETCO Insight transaction data platform. It reveals how the software's unique data streaming, decoding, semantic correlation and statistical analysis engines can be rapidly configured to monitor any application type - custom, packaged, or industry-specific. INETCO Insight produces a single rich transaction record for every transaction, containing business, application, infrastructure, and network performance information that can be sliced and diced instantly to serve the diverse needs of different members of the IT and business teams.

Code Sight IDE Plugin Combines SAST and SCA to Analyze Proprietary and Open Source Code | Synopsys

Until now, single analysis tools have given developers only a partial view of security risks – providing either static analysis of proprietary code or software composition analysis of open source. This separation often leads to undetected vulnerabilities, decreased developer productivity, and longer release cycles.

The HTTP Status Codes You Need to Know

Working on the web means coming into contact with HTTP responses. Whether you spend your time primarily on the client or on the server, you're likely familiar with the popular ones like 200, 404, and 500. While memorizing all the codes using cat memes as a mnemonic can be helpful, let's dive deeper into what some of the most common codes mean.

IoT Devices Designed by the World's Largest Manufacturers Infected with Malware

Researchers at TrapX Security recently discovered three of the world's largest manufacturers with IoT devices running Windows 7 infected with malware in an alleged supply chain attack. The company identified a cryptocurrency miner on numerous IoT devices, including automatic guided vehicles, a smart TV and a printer. All of these attacks are said to be a part of the same campaign.