adorsys » Company » News & knowledge
Explore our hub of latest news, insightful blogs, podcasts, and much more. Get the scoop on industry trends, company updates, and expert opinions
12.03.2025 Blog 4 mins reading time
A World Where Kubernetes Meets the Cloud Now Let’s assume you started a small website for sharing your favorite recipes. At first, everything is simple and there is low traffic, a few visitors a day, and a single server to handle it all. But then, word spreads, your site becomes popular, and …
Continue reading
27.02.2025 Blog 4 mins reading time
Building Blueprints for the Cloud Have you ever set up cloud resources manually or using a cloud provider’s graphical user interface, only to forget the exact configurations when you needed to replicate them? Or worse, realized that a small manual change caused your application to break, leaving you scrambling to figure out …
19.02.2025 Blog 6 mins reading time
Our previous article, Understanding the Problem of Data at Rest, explored how Datasafe provides end-to-end encryption, modular storage backend support, and secure file sharing. In pursuit of securing sensitive information, encrypting data at rest is an essential strategy. However, encryption introduces its own set of challenges, particularly when it comes to efficient …
05.02.2025 Blog 5 mins reading time
With the growth of IoT and connected devices, secure and private communication between devices like smart sensors, appliances, and other connected devices has become essential. Decentralized Identifier Communication (DIDComm) provides a protocol that ensures private messaging, enabling devices to communicate directly without intermediaries accessing data. This makes DIDComm ideal for IoT networks …
30.01.2025 Blog 7 mins reading time
In today’s digital landscape, securing application dependencies is more crucial than ever. With the rise of cyber threats and the increasing complexity of software supply chains, organizations must adopt tools that manage and secure their third-party dependencies. In fact, software supply chain attacks have grown significantly, underscoring the importance of continuously identifying …
23.01.2025 Blog 8 mins reading time
The Hidden Danger in Every Line of Code: Securing Dependencies in Modern Software Development Imagine you’re working late on a critical feature for your product. Your team has just integrated a new library to add a slick feature that will make your app stand out in the marketplace. Your code runs smoothly, …