DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The Latest Security Topics

article thumbnail
DevOpsDays Chicago 2022: Cloud Security, Hacking Containers, Community, and Much More
DevOpsDays Chicago returned as an in-person event in 2022. Read event highlights, including how many conversations revolved around security and containers.
November 11, 2022
by Dwayne McDaniel
· 8,080 Views · 1 Like
article thumbnail
The Transition To The Quantum-Cryptography Era
Let's compare encryption standards we consider safe today with the actual technology — and what could make them not be safe anymore during the coming years.
November 9, 2022
by Felipe Ferrari
· 6,411 Views · 3 Likes
article thumbnail
The Technology Stack Needed To Build a Web3 Application
The age of Web3 startups has dawned upon us. This article dives into how you can jumpstart your process of building your dream Web3 startup.
November 8, 2022
by Abhishek Ghadge
· 6,437 Views · 2 Likes
article thumbnail
Secure Your WSO2 Micro Integrator Deployment
This article is about how to secure WSO2 Microintegrator on microservices integration deployment. It describes how to use keystores, secure vault, and more.
November 7, 2022
by Dhanushka Madushan CORE
· 5,978 Views · 2 Likes
article thumbnail
Thinking Like a Hacker: Commanding a Bot Army of Compromised Twitter Accounts
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Third case: Twitter API keys are used to pump an altcoin.
November 5, 2022
by C.J. May
· 6,300 Views · 1 Like
article thumbnail
5 Benefits of Detection-as-Code for Security Engineers
What is the best tool that security practitioners can use today? Detection-as-code. Here's why.
November 3, 2022
by Jack Naglieri
· 6,094 Views · 1 Like
article thumbnail
Guide to Create CSR for Code Signing Certificate
Quick and easy to follow guide on how to create CSR for your code signing certificate and moving further with the purchasing process.
November 3, 2022
by Anna Shipman
· 4,207 Views · 1 Like
article thumbnail
Implement DevSecOps to Secure Your CI/CD Pipeline
DevSecOps is a cultural approach to integrate security in our CI/CD pipeline. It ensures security is implemented on every stage of the SDLC and infrastructure.
November 2, 2022
by Alok Maurya
· 3,829 Views · 2 Likes
article thumbnail
EKS Security Checklist: 10 Best Practices for a Secure Cluster
Discover ten EKS security tactics to protect your Kubernetes clusters and tighten your application security.
November 2, 2022
by Olesia Pozdniakova
· 3,226 Views · 1 Like
article thumbnail
How a Data Privacy API Abstracts and Simplifies Privacy and Compliance
Navigating the world of privacy and compliance is no trivial task. In this post, take a look at the data privacy API: the what, the why, the how, and the who.
November 2, 2022
by Michael Bogan CORE
· 3,428 Views · 1 Like
article thumbnail
SSH vs X.509 Certificates
This article will briefly discuss what SSH certificates are, why you should be using them, and the key distinctions between them and X.509 certificates.
November 2, 2022
by Linda Ikechukwu
· 4,302 Views · 1 Like
article thumbnail
Top Blockchain APIs for the Developer
In this article, we'll figure out how API is used for blockchain and how API integration might benefit the app.
November 1, 2022
by Tetiana Stoyko
· 3,675 Views · 1 Like
article thumbnail
Thinking Like a Hacker: AWS Keys in Private Repos
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Second case: an AWS secret is found in a private repository.
November 1, 2022
by C.J. May
· 5,159 Views · 2 Likes
article thumbnail
How To Convert Image Files Into GIF or WebP Format Using Java
Learn how you can convert dozens of common image file types - including, but not limited to, PNG and JPG - into GIF and WebP format respectively.
October 31, 2022
by Brian O'Neill CORE
· 6,123 Views · 3 Likes
article thumbnail
Using Short-Lived Tokens To Authenticate Python Applications to CockroachDB
JWT tokens can replace passwords for a safer and more secure cloud-native future. Follow this tutorial to get JWT AuthN working with your Python application.
October 28, 2022
by Artem Ervits CORE
· 9,542 Views · 1 Like
article thumbnail
Cloud Key Management Services Use Cases
This article will compare the primary security key management services solution use cases among the Azure key vault, AWS KMS, Google CKMS, and other Cloud key management solutions.
October 28, 2022
by Gary Li CORE
· 6,811 Views · 2 Likes
article thumbnail
[DZone Survey] Calling All Security Practitioners to Take Our Security Survey!
Share your thoughts with us and enter for a chance to win a $250 gift card!
October 28, 2022
by Caitlin Candelmo
· 6,877 Views · 3 Likes
article thumbnail
GitHub Security 101: Best Practices for Securing Your Repository
DevSecOps expert and GitHub Star Sonya Moisset shared with us her tips to improve your open-source repository's security in a few simple steps.
October 28, 2022
by Sonya Moisset
· 7,570 Views · 2 Likes
article thumbnail
Putting Identity at the Center of Zero Trust
Identity is a foundational building block of Zero Trust. Here's how to build your Zero Trust strategy with identity at the center.
October 27, 2022
by Jackson Shaw
· 4,087 Views · 1 Like
article thumbnail
Internal Security
Security is at odds with productivity and team cohesion. It doesn't have to be. There's a balance to strike that mitigates external and internal risk.
October 25, 2022
by Shai Almog CORE
· 4,702 Views · 2 Likes
  • Previous
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: