DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Integrating PostgreSQL Databases with ANF: Join this workshop to learn how to create a PostgreSQL server using Instaclustr’s managed service

Mobile Database Essentials: Assess data needs, storage requirements, and more when leveraging databases for cloud and edge applications.

Monitoring and Observability for LLMs: Datadog and Google Cloud discuss how to achieve optimal AI model performance.

Automated Testing: The latest on architecture, TDD, and the benefits of AI and low-code tools.

The Latest Security Topics

article thumbnail
API Security Is a Hot Topic, Here’s Why
APIs are a critical part of many modern applications that expose functionality and data to external users, making them an attractive target for attackers.
June 23, 2023
by Tom Smith CORE
· 5,307 Views · 2 Likes
article thumbnail
Unveiling the Dark Side of AI: How Prompt Hacking Can Sabotage Your AI Systems
Protect your AI systems to prevent LLMs prompt hacking and safeguard your data. Learn the risks, impacts, and prevention strategies against this emerging threat.
June 23, 2023
by Jorge Torres
· 6,574 Views · 1 Like
article thumbnail
Threat Hunting Uncovered: Innovative Strategies for Cybersecurity
This article delves into the world of threat hunting and presents cutting-edge methods to bolster cybersecurity defenses in 2023.
June 22, 2023
by Burak Cinar
· 3,811 Views · 2 Likes
article thumbnail
Building a Robust Cloud Migration Framework: Security Considerations
Ensure a safe and successful cloud migration journey by hiring the best cloud consulting services that meet all the security considerations.
June 22, 2023
by Smith Johnes
· 2,950 Views · 1 Like
article thumbnail
Enterprise DevOps: Importance and Key Benefits You Need to Know
Discover the power of Enterprise DevOps: Explore valuable tips, strategies, and benefits in our insightful blog post.
June 22, 2023
by Vipul Makwana
· 2,705 Views · 1 Like
article thumbnail
What Happens When You Type a URL Into Your Browser?
At a high level, the following operations happen in the background when you type a URL into your browser and press Enter: 1. DNS resolution 2. TCP three-way handshake 3. HTTPS upgrade 4. HTTP Request/Response 5. Browser rendering the response from the server.
June 21, 2023
by N K
· 3,763 Views · 1 Like
article thumbnail
Building Web Applications With .NET: Best Practices and Techniques
In this article, explore the best practices and techniques for building modern web applications using the .NET framework.
June 21, 2023
by manvi Sharma
· 2,220 Views · 1 Like
article thumbnail
AI Threats Today: The Unseen Challenges in Our Automated World
This article discusses the emerging AI threats in 2023, the complexities of securing AI systems, and the importance of AI-driven defense, regulation, and education.
June 21, 2023
by Burak Cinar
· 2,310 Views · 2 Likes
article thumbnail
Real-World Cyberattacks Targeting Data Science Tools
Aqua Nautilus researchers explore how to protect Jupyter Notebook and other popular data science tools against crypto mining and ransomware attacks.
June 21, 2023
by Assaf Morag
· 3,341 Views · 1 Like
article thumbnail
APIs Under Attack: How To Prepare for and Respond to Breaches
This article explores the topic of API security breaches and provides valuable insights on how to prepare for and respond to such attacks effectively.
June 21, 2023
by Helen Stewart
· 3,441 Views · 1 Like
article thumbnail
How to Get Started With Istio in Kubernetes in 5 Steps
Open-source Istio service mesh simplifies and secures the network of microservices in the cloud. Check out the 5 steps you need to deploy Istio in K8s.
June 20, 2023
by Ravi Verma
· 5,385 Views · 3 Likes
article thumbnail
Modern Access Control Explained
A review of the strengths and weaknesses of the two approaches to cloud-native authorization, and an open-source project that provides the best of both.
June 20, 2023
by Noa Shavit
· 3,686 Views · 2 Likes
article thumbnail
Data Governance – Data Privacy and Security – Part 1
Data Governance helps organizations manage their data effectively, ensuring quality and security for better decision-making.
June 20, 2023
by Sukanya Konatam
· 3,124 Views · 2 Likes
article thumbnail
Choosing the Right Functions in C Programming: Strcpy vs. Strncpy
Discover the differences between two popular C Programming functions, strcpy, and strncpy, to determine which one is right for your coding needs.
June 20, 2023
by Ryan Kh
· 1,911 Views · 1 Like
article thumbnail
Kafka: Navigating GDPR Compliance
The challenges posed by GDPR’s “Right to be Forgotten” in the context of Apache Kafka and three strategies for overcoming them.
June 20, 2023
by Greg Nuttall
· 2,214 Views · 1 Like
article thumbnail
Mastering Proactive Defense: The Changing Face of Threat Hunting
In this article, we will explore the changing landscape of threat hunting and discuss the importance of proactive defense strategies.
June 19, 2023
by Burak Cinar
· 2,809 Views · 2 Likes
article thumbnail
Secure Coding Best Practices
Understand the anti-patterns and best practices of secure coding. Shift left and automate the process by introducing SAST and Vulnerability Management tools.
June 19, 2023
by Anjul Sahu
· 2,561 Views · 1 Like
article thumbnail
Vulnerability Management in DevSecOps
In this article, we discuss the importance of practicing an efficient vulnerability management approach in the DevSecOps ecosystem.
June 19, 2023
by Balamurali Sreekanth Akula
· 3,369 Views · 6 Likes
article thumbnail
How Does GDPR Impact the App Development Workflow?
GDPR's impact on data privacy has been well-documented, but how does the regulation impact the actual development process?
June 18, 2023
by Zac Amos
· 4,170 Views · 2 Likes
article thumbnail
Virtualization Security Risks and Solutions
Understand the security threats to virtualization platforms and how to overcome them.
June 18, 2023
by Aditya Bhuyan
· 4,279 Views · 1 Like
  • Previous
  • ...
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: