DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Security Topics

article thumbnail
How to Secure Your Raspberry Pi and Enable Safe, Resilient Updates
Learn how to safely encrypt and sign your Raspberry Pi filesystem and make reliably, recoverable updates easy and safe using hardware-based encryption.
October 21, 2024
by David G. Simmons DZone Core CORE
· 8,254 Views · 2 Likes
article thumbnail
Securing Cloud-Native Applications: A CISO’s Perspective on Broken Access Control
Here is a CISO's perspective on preventing broken access control vulnerabilities and the components and importance of proper permission management for cloud-native apps.
October 18, 2024
by Gabriel L. Manor
· 5,113 Views · 2 Likes
article thumbnail
Secure Golden Images: A Blueprint for Vulnerability Management
In this article, learn about securing your AWS EC2 instances by deploying Secure Golden Images (SGIs) at regular intervals.
October 18, 2024
by Jake Howering
· 5,117 Views · 3 Likes
article thumbnail
GitHub Copilot Security and Privacy Concerns: Understanding the Risks and Best Practices
Worried about GitHub Copilot’s security and privacy concerns? Learn about potential risks and best practices while leveraging AI.
October 17, 2024
by Dwayne McDaniel
· 4,919 Views · 3 Likes
article thumbnail
Acting Like We Care About Security
The final part of a 3-post series on why it's so hard for folks to care about security, and suggestions on ways to get them to start.
October 15, 2024
by Leon Adato
· 4,093 Views · 1 Like
article thumbnail
Data at Rest Encryption: Protecting Stored Data
Discover different methods of data at rest encryption, including symmetric, asymmetric, and full-disk, to protect stored data from unauthorized access.
October 15, 2024
by Michael Chukwube
· 4,568 Views · 1 Like
article thumbnail
Oracle CloudWorld 2024: Key Takeaways for Developers, Engineers and Architects
Oracle CloudWorld 2024 unveils AI innovations, multi-cloud strategies, and industry solutions. Learn how these advancements will empower developers and engineers.
October 15, 2024
by Tom Smith DZone Core CORE
· 4,746 Views · 1 Like
article thumbnail
Decoding DORA: EU's Unified Approach to ICT Risk Governance
The Digital Operational Resilience Act (DORA) aims to establish a unified framework for managing ICT risks in the EU financial sector.
October 14, 2024
by Manjit Chakraborty
· 3,349 Views · 1 Like
article thumbnail
How to Set up OAuth JWT Flow and mTLS in the Salesforce Connector for a MuleSoft App
Walk through the required steps to set up mutual TLS between the Mule app and the Salesforce Connected App we created in the first post of this series.
October 14, 2024
by GONZALO MARCOS
· 3,893 Views · 1 Like
article thumbnail
What We Learned About Secrets Security at AppSec Village at DEF CON 32
Learn about DEF CON 32: AppSec Village, exploring secrets security challenges, common questions, and how to detect and handle hidden credentials effectively.
October 14, 2024
by Dwayne McDaniel
· 4,159 Views · 2 Likes
article thumbnail
An Overview of TCPCopy for Beginners
In this article, learn more about TCPCopy, an open-source replay tool project, its underlying principles, and its architecture.
October 11, 2024
by Bin Wang
· 6,114 Views · 5 Likes
article thumbnail
Network Guardians: Crafting a Spring Boot-Driven Anomaly Detection System
This article series will take you through the process of developing a network anomaly detection system using the Spring Boot framework in a robust manner.
October 11, 2024
by Sreejith Sreekandan Nair
· 5,461 Views · 4 Likes
article thumbnail
The Importance of Verifying Your GitHub Environment’s Security Controls
Source code, being the most valuable asset of an organization, demands strong, reliable protection to safeguard it from potential threats.
October 9, 2024
by Daria Kulikova
· 6,513 Views · 3 Likes
article thumbnail
Starting to Care About Security
IT practitioners get leaders to care about security by putting things in business (not technical) terms and using data to make their case.
October 8, 2024
by Leon Adato
· 4,170 Views · 1 Like
article thumbnail
Security at the Onset: Stabilizing CSPM and DevSecOps
Proactively integrating CSPM with DevSecOps strengthens security by continuously monitoring and addressing vulnerabilities from development to deployment.
October 8, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 5,859 Views · 4 Likes
article thumbnail
Secret Management and Rotation
Learn about automating KMS key rotation for asymmetric keys to raise the security bar by replacing keys at an interval.
October 8, 2024
by Pranav Kumar Chaudhary
· 4,056 Views · 2 Likes
article thumbnail
Integrate Spring Boot With jOOQ, Liquibase, and Testcontainers
Get started with jOOQ, Liquibase, and Testcontainers: Create a basic Spring Boot application and integrate the aforementioned techniques including a test setup.
October 7, 2024
by Gunter Rotsaert DZone Core CORE
· 5,280 Views · 1 Like
article thumbnail
Enhanced API Security: Fine-Grained Access Control Using OPA and Kong Gateway
Kong secures APIs and OPA handles policy decisions. This custom plugin caches user data, minimizing database checks and ensuring fast, accurate access control.
October 4, 2024
by Amrutha Paladugu
· 5,446 Views · 4 Likes
article thumbnail
Understanding the Dependency Injection Lifecycle: Singleton, Scoped, and Transient With Detailed Examples
This article will help you gain a solid understanding of the lifecycle of singleton, scoped, and transient services when implementing dependency injection.
October 3, 2024
by Rishi Mohan
· 5,909 Views · 5 Likes
article thumbnail
Top 6 Cybersecurity Threat Detection Use Cases: How AI/ML Can Help Detect Advanced and Emerging Threats
Learn how to get started to design and build AI/ML solutions that are capable of revolutionizing the cybersecurity threat detection landscape.
October 2, 2024
by Mayank Singhi
· 3,478 Views · 2 Likes
  • Previous
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: