RESOURCES / BLOG / Security
Results for Tag ‘Security’
Media Security on the Web
Sharing visual media is essential to the success of your business. With the rise of digital content consumption, ensuring that your media is secure, optimized, and properly managed can protect your brand’s reputation and financial stability. Cloudinary, a comprehensive media management solution, offers features to address these security concerns. This…
Read More ->
Python Security Essentials for Your Apps
In July 2020, Twitter faced a serious security breach where high-profile accounts were compromised, leading to unauthorized tweets soliciting Bitcoin. This incident highlighted the vulnerability of online platforms to cyberattacks and underscored the urgent need for robust security measures in today’s digital landscape. Safeguarding applications against malicious actors is essential.
Read More ->
Protecting Cloudinary Credentials in an Enterprise Setting
The Challenge For IT and DevOps professionals, securing API credentials is crucial. While production systems often pull Cloudinary API credentials from secret managers, hands-on tasks like setup or maintenance present some challenges: Importing credentials into the shell session. This leaves the API secret in the shell history. Using a .env…
Read More ->
User-Generated Content, Part 4: Security
Part 1 of this series highlights the basics of user-generated content (UGC) and its benefits for e-commerce. Part 2 describes how to leverage UGC images in e-commerce and efficiently upload, transform, and deliver them with Cloudinary. Part 3 focuses on videos in UGC and the many…
Read More ->
DAM for Developers: Access Control
In my last post, we spoke about AI-Based Content Analysis. Now, given the importance of security and privacy, authentication is at the heart of virtually all software. Access control is the layer on top of authentication that determines who can access what. Why is access control necessary? Because within…
Read More ->
Why Isn't Everyone Delivering Online Content With HTTPS?
A standard invented in the 1990s by Netscape, secure HTTP (HTTPS) safeguards and encrypts web content by combining two protocols: HTTP (for communications) and Transport Layer Security (TLS) (for encryption). Since then, that standard has been widely adopted for e-commerce and banking sites. According to HTTP Archive, despite its…
Read More ->
Secure Image Transformations With Signed URLs on the Fly
Modern websites and mobile apps frequently showcase images of various dimensions, sometimes varying the graphics, resolutions, and look and feel for different devices (desktop, mobile, etc.); and revamping the graphics with upgrades. A key benefit Cloudinary offers is an easy, intuitive, and flexible process of modifying images. A case in…
Read More ->
How to Secure Images and Video Uploads to Your Systems
When was the last time you got paid $40,000 for a few days of work? That is what happened last year to Russian independent security researcher Andrey Leonov, who discovered that if you upload a specially constructed image file to Facebook, you can make Facebook’s internal servers, nested deep…
Read More ->
Protecting images and videos via cookie-based authentication and Cloudinary
Controlling who can access your images and videos, and when, can be an important concern for your business and security workflow. You may have resources that you only want some of your users or employees to access, or you may need to make sure that your original resources are secure,…
Read More ->
Start Using Cloudinary
Sign up for our free plan and start creating stunning visual experiences in minutes.
Sign Up for Free