DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

SBOMs are essential to circumventing software supply chain attacks, and they provide visibility into various software components.

The Latest IoT Topics

article thumbnail
Intro to Spring Data MongoDB Reactive and How to Move It to the Cloud
In this article, see an introduction to Spring Data MongoDB Reactive and see how to move it to the cloud.
Updated January 26, 2022
by Otavio Santana DZone Core CORE
· 37,701 Views · 8 Likes
article thumbnail
20 Best Proxies Online: Free and Paid Services
By masking your IP address from third parties, proxies can offer you more privacy online. Read on to discover the 20 best free and paid proxy services.
January 25, 2022
by Stefan Smiljkovic
· 6,053 Views · 4 Likes
article thumbnail
How to Answer Network Outage Questions
Lower the stress of network outage discussions with these business-friendly answers to two common questions: What happened? When will it be fixed?
January 25, 2022
by Chris Fenning
· 3,535 Views · 4 Likes
article thumbnail
IoT Analytics With Kafka for Real Estate and Smart Building
This blog post explores how event streaming with Apache Kafka enables IoT analytics for cost savings, better consumer experience, and reduced risk.
January 23, 2022
by Kai Wähner DZone Core CORE
· 20,050 Views · 5 Likes
article thumbnail
Intrusion Detection vs. Intrusion Prevention: The Beginner’s Guide to IPS and IDS
In this post, we'll explore two systems - the IPS and the IDS - and take a look at how they compare and what you should think about when implementing them.
January 22, 2022
by Everett Berry
· 3,921 Views · 3 Likes
article thumbnail
S3-Compatible Object Storage Powered by Blockchain/Web3
This article discusses encrypted and geo-redundant object storage at a fraction of the price of public clouds. Read below to find out more!
January 21, 2022
by Tom Smith DZone Core CORE
· 7,218 Views · 2 Likes
article thumbnail
Load Balancing — MQTT Broker Clustering Part 1
A quick introduction to MQTT message broking, the challenges of clustering, and then load balancing.
January 21, 2022
by Zaiming (stone) Shi
· 20,598 Views · 3 Likes
article thumbnail
Querying SQL Databases With PySpark
In this article, we'll learn about how to combine Postgres, PySpark, and Arctype to create powerful visualizations and queries on large data sets.
January 17, 2022
by Everett Berry
· 4,138 Views · 2 Likes
article thumbnail
Visualizing What a Neural Network Thinks
We will see how to visualize saliency maps and get an idea of what a neural network considers important in an image.
January 16, 2022
by Luca Venturi
· 5,436 Views · 3 Likes
article thumbnail
Top 5 Incidents and Outages of 2021
An overview of major IT incidents and outages in 2021.
January 14, 2022
by Quentin Rousseau
· 5,766 Views · 2 Likes
article thumbnail
Internet of Behavior (IoB): Is It the Future of Customer Experience?
The Internet of Behavior (IoB) is a world-changing technology that has the potential to influence customer experience. Here’s everything you need to know about IoB.
January 14, 2022
by Rodolfo Davis
· 22,197 Views · 5 Likes
article thumbnail
Major Technologies That Are Powering the Metaverse
In this blog, discover the latest technologies that are powering the metaverse — a 3D digital world brought to life by several new and interactive technologies.
January 14, 2022
by Piyush Agrawal
· 5,661 Views · 4 Likes
article thumbnail
The Case for Open Source IoT
A desire to “own” the IoT stack is the greatest threat to the mass adoption of the IoT. Explore three main drivers that prompt the argument for open source IoT.
January 12, 2022
by Kevin Martin
· 21,626 Views · 3 Likes
article thumbnail
How to Connect Two Containers From Different docker-compose Files
Containers from different docker-compose files can be in the same network, as long as you have the correct settings. Here's how to set up your network properly.
January 12, 2022
by Denis Chikurtev
· 6,709 Views · 3 Likes
article thumbnail
Penetration Testing 101: A Beginner’s Guide to Ethical Hacking
In this article, you’ll learn what penetration testing is and why it is used. It also highlights the different types and approaches to penetration testing.
January 10, 2022
by Anish Roy
· 4,521 Views · 3 Likes
article thumbnail
How Zero Trust Will Change Incident Response
Image Source: Pixabay What Is Incident Response? Incident response involves responding to potential threats, such as unauthorized access to a corporate network. An event can be a sign of a breach or a false positive. However, it still requires investigation to determine the appropriate response. The goal of incident response is to detect and remediate attacks quickly. Organizations use incident response to minimize risks, respond promptly, and prevent breaches. An incident response plan is generally considered the first line of defense and, ideally, the last if it helps you prevent a breach or quickly block an attack. Here are the three main components of incident response: Incident response plan—a clear and concise plan that outlines how the organization responds to each type of security threat, providing detailed instructions and definitions of roles and responsibilities. Incident response team—security experts that work in-house or externally as third parties hired to protect the organization against various security threats. Incident response technology—supports the team in detecting, blocking, and analyzing threats. Some incident response solutions can also intelligently respond to threats. NIST Incident Response Steps The National Institute of Standards and Technology (NIST) drafted the Incident Handling Guide with guidelines for incident responders. Here are the four phases for incident handling outlined by NIST: Preparation—the incident response team must have a well established incident response plan indicating who is responsible for each part of incident response and how to deal with specific types of incidents. Detection and analysis—the cyber incident response team detects cyber incidents and collects relevant data, analyzing that data. They document and prioritize the incident when necessary before informing the appropriate authorities. Containment, eradication, and recovery—following an incident, the cyber incident response team must create and implement strategies to stop the attack, remove the threat and begin the recovery process. Post-incident activity—once an organization successfully resolves an incident, the team should go back to the first step and prepare for the next incident. Knowledge gained from each incident should inform the next preparation process, helping add new information or fine-tune processes. The NIST incident response guide suggests that preparing for incidents is an organization’s best defense. What is Zero Trust? Zero trust is a new approach to cybersecurity that secures an organization by doing away with implicit trust and continuously authenticating each stage of digital interaction. The “never trust, always verify” model informs the zero trust approach. This process works according to the premise that any user, resource, or asset is untrustworthy. Zero trust encompasses a set of principles, initiatives, policies, architecture, and frameworks. Here are characteristics of zero trust networks (ZTN): ZTN is an end-to-end functional solution that involves zero trust technology, policies, and systems designed to manage security. ZTNs are architected to manage security related to identities, credentials, identities, operations, access, hosting environment, endpoints, and infrastructure. A zero trust network deployment can have components that are cloud-based or on-premise. With a zero trust model, an organization must continually evaluate and authenticate all users before providing them with access to sensitive organizational data. Zero Trust and Incident Response Incident response is a critical organizational process used to detect cyber attacks and respond to them in a timely manner, preventing or minimizing damage to the organization. Zero trust networks provide new capabilities for incident responders. In the past, a security incident would require detailed investigation just to understand where the network was breached and how. In a zero trust environment, detailed information is available about suspicious access requests, and which individual user or device was involved in the incident. The following principles can guide incident response in a zero trust environment: Assume breach—the corporate network and insiders are not trusted. Focus on deterring violations and limiting incident damage for attackers already inside the network perimeter. Monitor identities, devices, applications, and data—a zero-trust network provides detailed information about these four elements with regard to any user request. When incident responders discover an incident, they can relate to the specific entities, applications and data involved. React to any anomaly—in a traditional network, incident responders received thousands of alerts, most of which were false positives. However, in a zero-trust environment alerts are much more focused and indicate a violation of network access rules, so they are more likely to indicate a real incident. Automated response—in a zero-trust environment, it is critical to put in place automatic detection and mitigation. Systems like zero trust network access (ZTNA) can detect anomalous access requests and automatically change network segmentation rules to protect sensitive systems. Automated response should provide a first line of defense, and deeper investigation can be carried out by human security teams. In a world of zero trust, security incidents will still happen. No technology can magically eliminate security threats. However, narrowing down the domain of trust will reduce the involvement of multiple resources in a single event. In other words, when an incident occurs, the smaller the trust area, the lesser the risk that other systems face. This enables faster detection, more efficient response, and greater confidence that a threat has really been eradicated. Conclusion In this article, I explained the basics of incident response and zero trust and explained how the zero trust revolution will impact how we defend computing systems: Assume breach mentality—an incident response process must take into account that attackers are already inside the secured perimeter. Visibility of devices and applications—in order to respond to security incidents, security teams must have complete visibility of the devices accessing corporate systems, and what applications, data or capabilities they are using. Continuous verification—the network must be able to continuously verify access attempts and any anomaly in verifications should be treated as a security incident. Automated response—in a zero trust environment, automated remediation is key to incident response, but it must be combined with human oversight and identification of root cause. I hope this will be useful as you adapt your organization’s security processes to a new zero trust environment.
January 10, 2022
by Gilad David Maayan DZone Core CORE
· 6,075 Views · 3 Likes
article thumbnail
Apache Kafka as Cloud-Native iPaaS Integration Middleware
This post explores why Apache Kafka is the new black for integration projects, how it fits cloud-native iPaaS solutions, and why event streaming is a new software category.
January 4, 2022
by Kai Wähner DZone Core CORE
· 5,956 Views · 5 Likes
article thumbnail
Snowflake Data Processing With Snowpark DataFrames
Snowpark is a new developer library in Snowflake that provides an API to process data using programming languages like Scala (and later on Java or Python), instead of SQL.
January 4, 2022
by Istvan Szegedi
· 15,143 Views · 5 Likes
article thumbnail
Hardware Optimization: Best Practices for Database Performance Boost
This article goes through the process of choosing the right components for your database server, ensuring the best performance for database workloads and apps.
December 27, 2021
by Borko Drljaca
· 8,522 Views · 1 Like
article thumbnail
Designing High-Volume Systems Using Event-Driven Architectures
Building cloud natively
December 14, 2021
by Ram Ravishankar
· 15,539 Views · 14 Likes
  • Previous
  • ...
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: