DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Security Topics

article thumbnail
Security by Design: NIST Framework Implementation for Developers
Many organizations struggle with cybersecurity risk management, giving rise to security by design as an essential strategy for building resilient software systems.
November 11, 2024
by Joseph Chukwube
· 420 Views · 1 Like
article thumbnail
10 Dos and Don'ts of Threat Modeling
Explore five essential dos and five don’ts of threat modeling, focusing on the SDLC, automation, security culture, continuous improvement, and more.
November 11, 2024
by Apostolos Giannakidis DZone Core CORE
· 1,069 Views · 2 Likes
article thumbnail
Secure Data Stack: Navigating Adoption Challenges of Data Encryption
Enhance data security with a gradual approach, focusing on areas like field-level and whole file encryption. Adopt data encryption and minimize day-to-day disruptions.
November 8, 2024
by Lulu Cheng
· 1,975 Views · 2 Likes
article thumbnail
Different Types of Automation Testing
Learn all about automation testing, including its various types, available tools, key advantages, and significant impact on software quality and efficiency.
November 8, 2024
by Sanjaykumar Ghinaiya
· 1,106 Views · 1 Like
article thumbnail
Building Secure Smart Contracts: Best Practices and Common Vulnerabilities
Explore best practices and common vulnerabilities in building secure smart contracts to enhance reliability and protect against breaches.
November 7, 2024
by Devin Partida
· 668 Views · 1 Like
article thumbnail
Designing Scalable and Secure Cloud-Native Architectures: Technical Strategies and Best Practices
Explore the flexibility, scalability, and efficiency of cloud-native architecture compared to monolithic architecture, and learn the challenges of implementing.
November 6, 2024
by Roman Shmyhelskyi
· 15,955 Views · 65 Likes
article thumbnail
Making Sense of Open-Source Vulnerability Databases: NVD, OSV, and More
Explore this essential reading for devs and security professionals alike: a comprehensive comparison of vulnerability databases to help cut through the noise.
November 6, 2024
by C.J. May
· 767 Views · 1 Like
article thumbnail
Wow, pnpm, You’re Really Fast
Learn how to use pnpm on Heroku, explore its storage and speed benefits, and see why it’s an ideal choice for Node.js developers. Get started with this guide.
November 6, 2024
by Alvin Lee DZone Core CORE
· 1,936 Views · 5 Likes
article thumbnail
Data Governance Essentials: Glossaries, Catalogs, and Lineage (Part 5)
Discover how business glossaries, data catalogs, and data lineage work together to enhance data quality, compliance, transparency, and operational efficiency.
November 1, 2024
by Sukanya Konatam
· 13,203 Views · 2 Likes
article thumbnail
4 Essential Strategies for Enhancing Your Application Security Posture
Learn 4 challenges that AppSec professionals face on the road to an enhanced application security posture and the ASPM strategies they can use to address them.
October 31, 2024
by Mark Levy
· 4,120 Views · 3 Likes
article thumbnail
Compliance Automated Standard Solution (COMPASS), Part 7: Compliance-to-Policy for IT Operation Policies Using Auditree
Implement the functionality of a CPAC for IT operations compliance that requires imperative policies with an example C2P plugin implementation for Auditree.
October 30, 2024
by Takumi Yanagawa
· 9,212 Views · 2 Likes
article thumbnail
Unifying SecOps and Observability for Enhanced Cloud Security in Azure
Building a unified SecOps and observability framework in Azure requires integrating security monitoring, threat detection, automation, and compliance.
October 29, 2024
by Mandeep Kaur
· 6,746 Views · 3 Likes
article thumbnail
Advanced CI/CD Pipeline Optimization Techniques Using GitHub Actions
Explore advanced techniques to optimize CI/CD pipelines using GitHub Actions, which enhances efficiency and reliability for enterprise-level operations.
October 28, 2024
by Venkata Thilak Ponnaganti
· 9,504 Views · 11 Likes
article thumbnail
Using AUTHID Parameter in Oracle PL/SQL
In Oracle, the AUTHID clause is a powerful option to manage DB security and access control. Explore its different settings and how to use it effectively.
October 28, 2024
by Sachin More
· 4,990 Views · 2 Likes
article thumbnail
12 Expert Tips for Secure Cloud Deployments
Explore essential strategies for securing cloud environments, focusing on IAM, encryption, automation, and proactive monitoring to mitigate cyber threats.
October 25, 2024
by Ralf Llanasas
· 6,541 Views · 4 Likes
article thumbnail
Accelerating Connection Handshakes in Trusted Network Environments
Follow an overview of methods like TCP FastOpen, TLSv1.3, 0-RTT, and HTTP/3 to reduce handshake delays and improve server response times in secure environments.
October 24, 2024
by Maksim Kupriianov
· 17,756 Views · 20 Likes
article thumbnail
How Federal Agencies Are Achieving Zero Trust With Automation
As cyberattacks grow in severity and sophistication, agencies are using AI and automation to meet zero-trust mandates and safeguard national infrastructure.
October 23, 2024
by Brandon Maxwell
· 3,630 Views · 1 Like
article thumbnail
Implement Hibernate Second-Level Cache With NCache
Set up a Java application with Hibernate, configure NCache as the second-level cache, and test the implementation to see how caching reduces the DB load.
October 22, 2024
by Abhinav Pandey
· 7,416 Views · 3 Likes
article thumbnail
How to Implement Client-Side Load Balancing With Spring Cloud
In this article, you will learn how to perform client-side load balancing in microservices by Spring Cloud Load Balancer.
October 21, 2024
by Mario Casari
· 9,901 Views · 5 Likes
article thumbnail
How to Secure Your Raspberry Pi and Enable Safe, Resilient Updates
Learn how to safely encrypt and sign your Raspberry Pi filesystem and make reliably, recoverable updates easy and safe using hardware-based encryption.
October 21, 2024
by David G. Simmons DZone Core CORE
· 8,380 Views · 2 Likes
  • Previous
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: