DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Security Topics

article thumbnail
Network Sniffing: A Critical Concept in Network Security
Learn about network sniffing: what it is, how it works, and why it forms an important defense-in-depth security strategy.
September 30, 2024
by Deepak Antiya
· 4,436 Views · 2 Likes
article thumbnail
Why Haven’t You Upgraded to HTTP/2?
Let’s understand more about the benefits of upgrading to HTTP/2 and how it can impact consumers of your application or service.
September 30, 2024
by John Vester DZone Core CORE
· 55,465 Views · 3 Likes
article thumbnail
Is Spring AI Strong Enough for AI?
Explore Spring's capabilities within the AI domain, its potential integration with AI libraries, and its ability to effectively manage AI workflows.
September 27, 2024
by Reza Ganji DZone Core CORE
· 13,438 Views · 15 Likes
article thumbnail
Building a Zero Trust API With ASP.NET Core: A Developer’s Guide
Secure your ASP.NET Core API with a Zero Trust model by authenticating every request, enforcing least privilege, and continuously monitoring to protect against threats.
September 25, 2024
by Aneesh Gopalakrishnan
· 5,299 Views · 4 Likes
article thumbnail
Optimizing External Secrets Operator Traffic
Learn how to efficiently implement External Secrets Operator in your Kubernetes cluster to reap the benefits of External Secrets Management systems.
September 25, 2024
by Upasana Sharma
· 6,223 Views · 8 Likes
article thumbnail
Exploring the Sidecar Pattern in Cloud-Native Architecture
Throughout this article, explore what the sidecar pattern offers, its use cases, and why it has become so widely used in cloud-native environments.
September 24, 2024
by Gaurav Gaur DZone Core CORE
· 5,256 Views · 6 Likes
article thumbnail
Reducing Infrastructure Misconfigurations With IaC Security
IaC streamlines cloud management but brings security risks. Improve security with static code analysis and dynamic policy checks to mitigate misconfigurations.
September 23, 2024
by Siri Varma Vegiraju DZone Core CORE
· 4,738 Views · 2 Likes
article thumbnail
10 Security Best Practices for SaaS
SaaS security encompasses a range of measures and protocols designed to protect sensitive data and ensure the safety of users within a SaaS environment.
September 23, 2024
by Alfonso Valdes
· 4,275 Views · 6 Likes
article thumbnail
Navigating the Regulatory Maze: Simplifying Data Compliance
Explore how IT professionals can address evolving regulatory compliance challenges in data management, reducing organizational risks and costs.
September 20, 2024
by Tom Smith DZone Core CORE
· 3,820 Views · 1 Like
article thumbnail
Securing Your Enterprise With an Identity-First Security Strategy
Cyberattacks are becoming increasingly sophisticated. Learn how an identity-first security strategy can tackle the evolving cyber threats in an AI-first-world.
September 18, 2024
by Vijay Pitchumani
· 3,526 Views · 2 Likes
article thumbnail
Nobody Cares About Security
We keep making the wrong case about (and for) security, which is why it's so hard to get anyone to care.
September 18, 2024
by Leon Adato
· 4,972 Views · 3 Likes
article thumbnail
AI and Technical Debt: Balancing Innovation and Sustainability
Learn how to navigate technical debt in AI projects, balance rapid adoption with long-term sustainability, and implement best practices for successful AI initiatives.
September 17, 2024
by Tom Smith DZone Core CORE
· 4,329 Views · 2 Likes
article thumbnail
Obfuscation vs Encryption: How to Protect Your .NET Code the Right Way
Are you confused between obfuscation and encryption or when to use each technique? Read this guide to get a clear understanding of obfuscation and encryption.
September 16, 2024
by Madiha Jamal
· 3,344 Views · 1 Like
article thumbnail
Setting Up Secure Data Lakes for Starlight Financial: A Guide to AWS Implementation
This guide delves into securing financial data lakes with AWS services, focusing on best practices for data protection and compliance.
September 13, 2024
by Harsh Daiya DZone Core CORE
· 4,982 Views · 1 Like
article thumbnail
The Critical Role of Data at Rest Encryption in Cybersecurity
Data at rest encryption is vital in cybersecurity, securing stored data from unauthorized access and breaches. It ensures that even if data is stolen, it remains unreadable.
September 13, 2024
by Favour Efeoghene
· 4,001 Views · 2 Likes
article thumbnail
Designing a Secure Architecture for Distributed Systems
Follow an approach to secure distributed systems using an open-source project demonstrating how to integrate several security mechanisms and technologies.
September 12, 2024
by Alexsandro Souza
· 6,646 Views · 5 Likes
article thumbnail
Modern Authentication on .NET: OpenID Connect, BFF, SPA
Explore this detailed, step-by-step guide to building a custom authentication system using SPA, BFF, and OpenID Connect on the .NET platform.
September 12, 2024
by Kirill Kovalev
· 4,103 Views · 2 Likes
article thumbnail
Uncovering a Prototype Pollution Regression in the Core Node.js Project
Learn about the discovery of a Node.js security regression that resulted in prototype pollution vulnerability, and how it was fixed.
September 11, 2024
by Liran Tal
· 4,576 Views · 1 Like
article thumbnail
Optimizing Data Management for AI Success: Industry Insights and Best Practices
Explore key strategies for effective data management in AI projects, including real-time access, federated queries, and data literacy for developers and engineers.
September 11, 2024
by Tom Smith DZone Core CORE
· 4,590 Views · 1 Like
article thumbnail
8 Practices Software Engineers Should Adopt and Champion for Cybersecurity
Surprisingly, cybersecurity could be as simple as following best practices, which ideally should be integrated into the culture itself. Learn more in this post.
September 11, 2024
by Manish Sinha
· 5,148 Views · 3 Likes
  • Previous
  • ...
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: