adorsys » Company » Knowledge
Explore our hub of latest news, insightful blogs, podcasts, and much more. Get the scoop on industry trends, company updates, and expert opinions
16.01.2025 Blog 6 mins reading time
Introduction Imagine this: You’re managing a web application, serving thousands of users daily. One day, you wake up to alarming news—a vulnerability in a library/dependency your application depends on is being exploited in the wild. Panic sets in. How severe is this vulnerability? How quickly should you act? This is where tools …
Continue reading
06.01.2025 Blog 3 mins reading time
Press Release Dublin, Ireland – January 6th, 2025 – adorsys Ireland is proud to announce its membership in the Rust Foundation, reaffirming its commitment to advancing the Rust programming language as a cornerstone of secure and sustainable software development. This step aligns with global shifts toward Rust as a safer, more efficient …
26.12.2024 Blog 7 mins reading time
Before diving into the core of dependency management, it’s important to understand the role of Java modules. Java modules allow for better organization and separation of concerns in large applications. They can impact visibility at both compile time and runtime, offering a means to encapsulate code and reduce unnecessary exposure of internal …
19.12.2024 Blog 2 mins reading time
In today’s interconnected world, software security is paramount. As developers, we rely heavily on open-source libraries and modules to accelerate development. However, these external dependencies can introduce vulnerabilities, exposing our applications to potential attacks. This article series will explore the critical aspects of dependency management and vulnerability scanning, focusing on practical solutions …
11.12.2024 Blog 5 mins reading time
Welcome to the first article in our Series on Securing Data at Rest. Over the course of this series, we’ll explore the challenges of managing sensitive data and how Datasafe by adorsys, a Java-based encrypted record management tool, provides an innovative solution for managing secure data storage and sharing , tackle them …
14.11.2024 Blog 5 mins reading time
In the rapidly evolving world of digital identities and decentralized verification, Verifiable Credentials (VCs) are taking center stage. They promise secure, tamper-proof, and privacy-preserving ways for individuals and entities to prove their identity or claims. But with numerous standards emerging, one question arises: Is SD-JWT the perfect format for Verifiable Credentials? In …