Over a million developers have joined DZone.

Top 10 Security Articles on DZone

DZone's Guide to

Top 10 Security Articles on DZone

Interested in learning more about security? We've put together a list of the best security articles on DZone. Check 'em out!

· Security Zone ·
Free Resource

Discover how to provide active runtime protection for your web applications from known and unknown vulnerabilities including Remote Code Execution Attacks.

  1. Top 5 REST API Security Guidelines: An annotated list of security guidelines for your REST APIs when you are developing and testing them, including proper authorization, input validation, and output encoding.

  2. TLS/SSL Explained: TLS/SSL Terminology and Basics: We take a look at symmetric and asymmetric encryption, the various types of cipher techniques, and Message and Hash-Based Message Authentication Code.

  3. Steps to Building Authentication and Authorization for RESTful APIs: A guide to the difference between authentication and authorization, and why JSON web tokens are so useful for RESTful APIs.

  4. Advanced Microservices Security With Spring and OAuth: Starting from an API gateway, we build out authorization and authentication protocols using Spring and OAuth2 to show devs how to increase the security of their applications. 

  5. Security With Java in 2017: Originally written in February 2017, this article looked forward to the release of Java 9 and Java EE 8, and asked what security upgrades needed to be made to meet the challenges of 2017 and beyond.

  6. OAuth 2.0 Beginner's Guide: We go over the basics of using OAuth 2.0, and show you step-by-step how to go about getting an OAuth access token.

  7. Go Beyond Username/Password with Modern Authentication: An introductory look to authentication proceeders other than username/password, such as Single-Sign On, that utilize the user's identity to create a more secure login experience.

  8. TLS Security: TLS/SSL Explained: A great glossary of all the terms you need to know to get started on your security journey with TLS/SSL. 

  9. Simple Attribute-Based Access Control With Spring Security: A great, in-depth look at Spring Security, and how to use it to implement access rules using context-based credentials (i.e. where the access happens), like the user's network or channel (like a web site, mobile app, some internal system, etc.).

  10. TLS/SSL Explained: Examples of a TLS Vulnerability and Attack, Final Part: We look at some of the worst attacks than can be carried out against an insecure SSL/TLS network, and how to stop them.

Find out how Waratek’s award-winning application security platform can improve the security of your new and legacy applications and platforms with no false positives, code changes or slowing your application.

security ,ssl/tls ,authentication ,api security

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}