JSON and XML
Have you ever wondered how is it possible that two different systems can share a document or, in…
Have you ever wondered how is it possible that two different systems can share a document or, in…
If you ever had to deal with the security design for a system you've probably heard these te…
Cipher suites are sets of instructions that enable secure network connections through Transport …
Perfect Forward Secrecy (PFS), also known as Forward Secrecy (FS), is a feature of certain key e…
A TLS (Transport Layer Security) session consists of several phases to establish a secure connec…
Encryption is the process of transforming information in a way that only authorized parties can …
Splunk is one of the most common options to externalize and centralize the logs of our mule apps…
In this second post we'll be reviewing more topics that you should take into consideration i…
You might need to migrate your legacy VPNs to Anypoint VPN. It might be that you are changing y…
Install required packages - these packages allow apt to use a repository over HTTPS
On June 30th of this year, 2024, Legacy VPNs connections will be End of Life. This means that al…
Why do we trust so much the communication in internet when we use HTTPS? Why are we so confident…
Cryptographic hashes are mathematical functions that take data as input and convert that input i…
How does an API client know if an API request is successful or not? You might think that the API…
Although creating a VPN connection for Cloudhub might seem a complicated (and for some scary!) t…
As we know, Cloudhub 2.0 has brought important changes to the Runtime Plane in Anypoint, especia…
Security has to be a key part of any development project, especially if it contains APIs. It’s …
In the past, and in many cases in th e present, IT organizations have relied on a unique set of …
La integración es el arte el proceso de hacer que múltiples y heterogéneos componentes sof…