DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
The Latest "Software Integration: The Intersection of APIs, Microservices, and Cloud-Based Systems" Trend Report
Get the report

The Latest Security Topics

article thumbnail
Efficiently Computing Permissions at Scale: Our Engineering Approach
The RBAC feature creates the notion of “Teams,” a perimeter where each member can see and act upon a restricted number of incidents.
January 18, 2023
by Eugene Nelou
· 3,532 Views · 1 Like
article thumbnail
Integration: Data, Security, Challenges, and Best Solutions
Explore the essentials of integration and lays a theoretical foundation for integrating systems using cloud and on-premises.
January 18, 2023
by Hariprasad Kapilavai
· 3,543 Views · 1 Like
article thumbnail
Top 10 Secure Coding Practices Every Developer Should Know
This guide will share the top ten secure coding practices that every developer should know. You'll never have to worry about writing insecure code again!
January 18, 2023
by Tanhaz Kamaly
· 7,403 Views · 1 Like
article thumbnail
Essential Mobile App Security Tips for Coders in 2023: Make Your App Unhackable
Build the profitable and unhackable and secure mobile app this year without worries of hackers with this Mobile App Development and Security Checklist!
January 17, 2023
by Anna Shipman
· 2,400 Views · 1 Like
article thumbnail
Are Your Password Management Practices up to Par?
Passwords are a fact of modern business but often aren't managed well. Here are some tips for creating a business culture conscious of password security.
January 17, 2023
by Zac Amos
· 2,266 Views · 1 Like
article thumbnail
Visual Network Mapping Your K8s Clusters To Assess Performance
Visual network mapping is crucial for effective network management. Caretta and Grafana provide real-time network visualization and monitoring.
January 17, 2023
by Anton Lawrence CORE
· 4,861 Views · 2 Likes
article thumbnail
Better Performance and Security by Monitoring Logs, Metrics, and More
Monitoring is a crucial part of observability. Learn how monitoring can specifically improve security, performance, and reliability in the next part of my series.
January 17, 2023
by John Vester CORE
· 32,723 Views · 5 Likes
article thumbnail
What Is Azure Site Recovery Service?
Implementing a BCDR strategy to ensure that your data is secure and that your apps and workloads are available during scheduled and unforeseen outages.
January 16, 2023
by Sardar Mudassar Ali Khan
· 2,547 Views · 1 Like
article thumbnail
Classifying Severity Levels for Your Organization
This blog helps you understand levels of severity and how they can enhance your incident response process.
January 16, 2023
by Vishal Padghan
· 2,624 Views · 1 Like
article thumbnail
Essential Protocols for Python Developers to Prevent SQL Injection Attacks
Python developers must familiarize themselves with challenges the final application might deal with, including security risks like SQL injection.
January 14, 2023
by Ryan Kh
· 4,429 Views · 1 Like
article thumbnail
What Are BitB Phishing Attacks?
A browser-in-the-browser (BitB) attack involves a replica of a single sign-on (SSO) authentication window popping up. It can be hard to spot, but you can take measures to protect against BitB scams.
January 14, 2023
by Zac Amos
· 5,198 Views · 1 Like
article thumbnail
A Guide To Successful DevOps in Web3
DevOps has revolutionized Web2 development. Now, these new tools are bringing DevOps to Web3—for testing, building, CI/CD, monitoring, planning, and feedback.
January 14, 2023
by Alvin Lee CORE
· 5,550 Views · 5 Likes
article thumbnail
A Real-Time Supply Chain Control Tower Powered by Kafka
This article explores a real-time supply chain control tower for end-to-end visibility and automation powered by the data streaming platform Apache Kafka.
January 13, 2023
by Kai Wähner CORE
· 4,029 Views · 4 Likes
article thumbnail
BSides SLC: Community, Fun, and Security Best Practices in Salt Lake City
BSidesSLC brought together security experts, developers, and students from all over Utah and beyond. Read the highlights!
January 13, 2023
by Dwayne McDaniel
· 2,131 Views · 1 Like
article thumbnail
Quick Guide: Role of Cloud-Native in Managing Big Data Applications
Big data and cloud-native technologies are discussed in this blog. We also discuss how important cloud native is too big data.
January 12, 2023
by Virendra Singh
· 2,024 Views · 1 Like
article thumbnail
Workload-Centric Over Infrastructure-Centric Development
This article takes a look at why a workload-centric approach is better for a developer's productivity in comparison to an infrastructure-centric approach.
January 12, 2023
by Susanne Tuenker
· 3,249 Views · 2 Likes
article thumbnail
OAuth Grant Types Guide
Deep dive guide throughout processes of obtaining Access Token in OAuth. Want to know how OAuth Grant Types works? This text is just for you.
January 12, 2023
by Bartłomiej Żyliński CORE
· 2,326 Views · 2 Likes
article thumbnail
API Security Is Finally Gaining Attention That it Deserves
Ensuring the security of API calls is crucial for protecting sensitive data, preventing unauthorized access, and maintaining the integrity of the system.
January 12, 2023
by Sakthiswaran Rangaraju
· 2,278 Views · 1 Like
article thumbnail
Should You Create Your Own E-Signature API?
E-signatures have many benefits, such as higher security. An e-signature API can make the signing experience much easier, but what's the best way to implement it: buying an API or building one?
January 12, 2023
by Zac Amos
· 3,898 Views · 1 Like
article thumbnail
How To Approach Legacy System Modernization
Know in-depth about the approach to legacy system modernization. Evaluate legacy systems, select app modernization approach, Retain/Encapsulate, and more.
January 11, 2023
by Hiren Dhaduk
· 4,514 Views · 3 Likes
  • Previous
  • ...
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: