Skip to content

RESOURCES / BLOG / Security

Results for Tag ‘Security’

Media Security on the Web

Topics Image Transformation, Security, User Generated Content
Read Time

Sharing visual media is essential to the success of your business. With the rise of digital content consumption, ensuring that your media is secure, optimized, and properly managed can protect your brand’s reputation and financial stability. Cloudinary, a comprehensive media management solution, offers features to address these security concerns. This…

Python Security Essentials for Your Apps

Topics app, Security
Read Time

In July 2020, Twitter faced a serious security breach where high-profile accounts were compromised, leading to unauthorized tweets soliciting Bitcoin. This incident highlighted the vulnerability of online platforms to cyberattacks and underscored the urgent need for robust security measures in today’s digital landscape. Safeguarding applications against malicious actors is essential.

Protecting Cloudinary Credentials in an Enterprise Setting

Topics API, Security
Read Time

The Challenge For IT and DevOps professionals, securing API credentials is crucial. While production systems often pull Cloudinary API credentials from secret managers, hands-on tasks like setup or maintenance present some challenges: Importing credentials into the shell session. This leaves the API secret in the shell history. Using a .env…

User-Generated Content, Part 4: Security

Topics Asset Management, e-commerce, Security, User Generated Content, Video, Video API
Read Time

Part 1 of this series highlights the basics of user-generated content (UGC) and its benefits for e-commerce. Part 2 describes how to leverage UGC images in e-commerce and efficiently upload, transform, and deliver them with Cloudinary. Part 3 focuses on videos in UGC and the many…

DAM for Developers: Access Control

Topics Digital Asset Management, Security
Read Time

In my last post, we spoke about AI-Based Content Analysis. Now, given the importance of security and privacy, authentication is at the heart of virtually all software. Access control is the layer on top of authentication that determines who can access what. Why is access control necessary? Because within…

Why Isn't Everyone Delivering Online Content With HTTPS?

Topics Asset Management, Security
Read Time

A standard invented in the 1990s by Netscape, secure HTTP (HTTPS) safeguards and encrypts web content by combining two protocols: HTTP (for communications) and Transport Layer Security (TLS) (for encryption). Since then, that standard has been widely adopted for e-commerce and banking sites. According to HTTP Archive, despite its…

Secure Image Transformations With Signed URLs on the Fly

Topics Django, Image Transformation, Node, PHP, Ruby on Rails, Security
Read Time

Modern websites and mobile apps frequently showcase images of various dimensions, sometimes varying the graphics, resolutions, and look and feel for different devices (desktop, mobile, etc.); and revamping the graphics with upgrades. A key benefit Cloudinary offers is an easy, intuitive, and flexible process of modifying images. A case in…

How to Secure Images and Video Uploads to Your Systems

Topics Security
Read Time

When was the last time you got paid $40,000 for a few days of work? That is what happened last year to Russian independent security researcher Andrey Leonov, who discovered that if you upload a specially constructed image file to Facebook, you can make Facebook’s internal servers, nested deep…

Protecting images and videos via cookie-based authentication and Cloudinary

Topics Image Transformation, Security
Read Time

Controlling who can access your images and videos, and when, can be an important concern for your business and security workflow. You may have resources that you only want some of your users or employees to access, or you may need to make sure that your original resources are secure,…

Start Using Cloudinary

Sign up for our free plan and start creating stunning visual experiences in minutes.

Sign Up for Free