Latest posts
Dynamic DataWeave for secure access to UCSF’s EHR data
Veera Gopalakrishnan, a System Integration Engineer, and Swarnim Ranjitkar, a Sr. Software Engineer, at University of California, San Francisco (UCSF) both have more than... read more.
How to secure your APIs in MuleSoft’s Anypoint Platform
In my daily interactions with MuleSoft customers, I always get the question what I regard as the most effective way to secure Mule applications... read more.
What’s new in access management?
This blog describes upcoming Anypoint Platform features within access management, mapping them to the most common use cases and customer needs. ... read more.
Digital, data, and security: fundamental principles of government
In my last blog, I discussed a few ways governments can create citizen journeys with API-led connectivity to address the inertia caused by legacy... read more.
10 steps for setting IPsec VPN between a customer’s data center and CloudHub
You can connect to MuleSoft's Virtual Private Cloud in multiple ways. IPsec tunnel is one of the ways you can connect an Anypoint Virtual... read more.
How to secure an API with OIDC in Anypoint Platform
Security is one of the most critical requirements when we're talking about developing modern APIs. But implementing this requirement can also be a straightforward... read more.
5 ways to ensure data and API security
In 2018, there were 6,500 data breaches reported, exposing billions of records for potential misuse. In today’s digitally connected world, security is almost always... read more.
Facebook, privacy, and the delicate data dance
As a consequence of the recent FTC investigation, Facebook cut off friend data access for Microsoft and Sony and announced an overhaul of its... read more.
Enable AI without compromising on cybersecurity
Many businesses today are trying to augment and improve their customer, partner, and employee experiences by leveraging artificial intelligence and bots, yet grapple with... read more.
Identity and Access Management with Anypoint Platform
This blog aims at capturing different technologies and protocols in the IAM space and mapping them to Anypoint Platform. ... read more.