‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 
IBM Developer
Open Technology
June/July 2020
Hello, developers!
When a company has a security breach that exposes customer data, it's costly to their reputation and to their bottom line. A new open source project from IBM enables developers to use encrypted data to be used in computation without the need to decrypt it first.

The IBM Fully Homomorphic Encryption Toolkits provide code and development environment settings that developers can use to build encryption into the fabric of their applications without requiring expertise in cryptography. 

Read our blog post to learn more about the project and to get involved: New open source security tools let you develop on encrypted data.

This month we're also offering another opportunity to brush up on your security skills with our Digital Developer Conference: Cloud Native Security on June 24, 25, and July 1.  Led by subject matter experts from IBM and Red Hat, these technical sessions and hands-on labs offer beginners and experts alike an opportunity to explore three dedicated tracks: Application Security, Data Security, and DevSecOps. Register for free now.

Todd Moore
VP of Open Technology, IBM Developer and Developer Advocacy
Visit the Open hub
Open Source Trends
Digital Developer Conference | Cloud Native Security
Watch the video
Focus on data privacy with a back end for a mobile loyalty app
The code pattern shows how to deploy a microservice-based back end in OpenShift 4.3, with examples in Red Hat OpenShift on IBM Cloud. To simulate a series of mobile views, the examples show how to deploy a Node.js-based service.
Encrypted container images for container image security at rest
It's critical that the data and code in container images is secure and confidential.  Learn about using container image security to build and distribute encrypted container images that are only available to a specific set of recipients.
Protecting data using secret management with Trusted Service Identity
Learn about the Trusted Service Identity open source project that enables secure secret protection.
Node.js security series
Learn about developing and deploying Node.js securely. Topics include using npm audit, auditing and updating dependencies, avoiding arbitrary code execution vulnerabilities, and more.
Equal Access
IBM Equal Access Toolkit now available to develop accessible websites and applications
Watch the video
Other items of interest
Blog: IBM and Java: The next 25 years
Blog: Use open source Drain3 log-template mining project to monitor for network outages
Tutorial: Integrate Java microservices with blockchain using Hyperledger Fabric and Open Liberty  
Cloud native security conference
June 24, 25, and July 1; Virtual
Open Source Summit, North America
June 29–July 2; Virtual
OSCON Open Source Software Superstream Series
July 16 and August 13; Virtual