DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Look Inside
DZone's Guide to

Security: Defending Your Code

As software attacks become more frequent and severe, it’s becoming more and more important to understand the top threats and how to protect against them. The 2018 DZone Guide to Security: Defending Your Code covers going beyond shifting left to protect applications, how to reduce hacker risk, and how AI takes security to the next level.

Free 54-page ebook
Download
8.8K

Table of Contents

2
Executive Summary
4
Key Research Findings
7
Security Through Blockchain
12
Why Are So Many Companies Getting Hacked, and What Can Be Done About It?
16
Securing Embedded Systems
19
How AI Takes Cybersecurity to the Next Level
24
Beating the Cost, Time, and Quality Equation With OWASP ZAP Automation
27
Diving Deeper Into Security
30
'Shift Up': New Security Considerations for Containers-as-a-Service and Serverless Architectures
32
Apply These Best Practices to Secure Android and iOS Mobile Apps
36
Overview and Evolution of Virtual Patching
38
Executive Insights on the Current and Future State of Security
41
Solutions Directory
51
Glossary
Download

Featured Authors

Justin Albano
Software Engineer, IBM
Brian Kelly
Head of Conjur Engineering, CyberArk
Christopher Lamb
Distinguished Member of Technical Staff, Sandia National Laboratories
Frederic Jacquet
Technology Evangelist - AI Ethics
James McDermott
Senior Infrastructure Architect, Dropsource
Tsvi Korren
Chief Solutions Architect, Aqua Security
Katie Strzempka
VP of Customer Success and Services, NowSecure
Apostolos Giannakidis
Tom Smith
Help companies use data and technology to improve UX/CX while reducing costs.

Interactive Preview

Download

Publications

  • Featured
  • Latest
  • Popular

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: