DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

How does AI transform chaos engineering from an experiment into a critical capability? Learn how to effectively operationalize the chaos.

Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.

Are you a front-end or full-stack developer frustrated by front-end distractions? Learn to move forward with tooling and clear boundaries.

Developer Experience: Demand to support engineering teams has risen, and there is a shift from traditional DevOps to workflow improvements.

The Latest Security Topics

article thumbnail
Designing a Secure Architecture for Distributed Systems
Follow an approach to secure distributed systems using an open-source project demonstrating how to integrate several security mechanisms and technologies.
September 12, 2024
by Alexsandro Souza
· 6,694 Views · 5 Likes
article thumbnail
Modern Authentication on .NET: OpenID Connect, BFF, SPA
Explore this detailed, step-by-step guide to building a custom authentication system using SPA, BFF, and OpenID Connect on the .NET platform.
September 12, 2024
by Kirill Kovalev
· 4,183 Views · 2 Likes
article thumbnail
Uncovering a Prototype Pollution Regression in the Core Node.js Project
Learn about the discovery of a Node.js security regression that resulted in prototype pollution vulnerability, and how it was fixed.
September 11, 2024
by Liran Tal
· 4,609 Views · 1 Like
article thumbnail
Optimizing Data Management for AI Success: Industry Insights and Best Practices
Explore key strategies for effective data management in AI projects, including real-time access, federated queries, and data literacy for developers and engineers.
September 11, 2024
by Tom Smith DZone Core CORE
· 4,706 Views · 1 Like
article thumbnail
8 Practices Software Engineers Should Adopt and Champion for Cybersecurity
Surprisingly, cybersecurity could be as simple as following best practices, which ideally should be integrated into the culture itself. Learn more in this post.
September 11, 2024
by Manish Sinha
· 5,213 Views · 3 Likes
article thumbnail
Top Security Flaws Hiding in Your Code Right Now and How to Fix Them
This article examines the three most common injection attack types: SQL injection, Deserialization Injection, and Logging Injection — and discusses ways to prevent them.
September 10, 2024
by Jonathan Vila
· 4,610 Views · 3 Likes
article thumbnail
Principles of Modern Data Infrastructure
Explore principles of modern data infrastructure such as scalability, high availability, speed, security, maintainability, efficiency, and developer experience.
September 6, 2024
by Joe Zhou
· 5,165 Views · 1 Like
article thumbnail
The AI Security Gap: Protecting Systems in the Age of Generative AI
As GenAI adoption surges, organizations face new security risks. Learn to protect your AI systems from prompt hacking and other emerging threats.
September 5, 2024
by Tom Smith DZone Core CORE
· 4,868 Views · 1 Like
article thumbnail
Order in Chaos: Python Configuration Management for Enterprise Applications
Explore a systematic approach to dealing with configurations in Python including tools, best practices, and real-world examples.
September 4, 2024
by Prince Bose
· 5,496 Views · 4 Likes
article thumbnail
5 Steps to Integrate Istio With OPA
Cloud architects and DevOps engineers can learn how to integrate Open Policy Agent (OPA) with sidecar containers to easily define and enforce policies in Istio mesh.
September 4, 2024
by Pulak Das
· 5,221 Views · 1 Like
article thumbnail
A Comprehensive Guide to Access and Secrets Management: From Zero Trust to AI Integration — Innovations in Safeguarding Sensitive Information
By implementing effective secrets management, organizations can reduce risk, improve operational efficiency, and respond to incidents more quickly.
September 4, 2024
by Boris Zaikin DZone Core CORE
· 5,259 Views · 2 Likes
article thumbnail
How to Conduct Effective Data Security Audits for Big Data Systems
Learn key strategies for conducting thorough data security audits in big data systems to safeguard sensitive information.
September 4, 2024
by Devin Partida
· 5,105 Views · 1 Like
article thumbnail
Open Standards for Data Lineage: OpenLineage for Batch and Streaming
Explores trends and efforts to provide an open standard with OpenLineage, and how data governance solutions help fulfill enterprise-wide data governance needs.
September 3, 2024
by Kai Wähner DZone Core CORE
· 6,012 Views · 1 Like
article thumbnail
Building Trust Through "Zero Trust:" Transforming Organizational Security Culture
The zero-trust security model empowers developers to build and deploy applications with security as a core component.
September 3, 2024
by Marija Naumovska DZone Core CORE
· 4,954 Views · 2 Likes
article thumbnail
Bridging the Gap: How Developers and Security Professionals Can Collaborate for Better Cybersecurity
Experts at Black Hat 2024 reveal how developers and security pros can collaborate better: from shifting left to embracing AI and prioritizing user experience.
September 3, 2024
by Tom Smith DZone Core CORE
· 4,636 Views · 1 Like
article thumbnail
Workload Protection in the Cloud: Why It Matters More Than Ever
Protecting cloud workloads is crucial as threats evolve and environments become more complex. Learn about effective Cloud Workload Protection (CWP) here.
September 3, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 4,296 Views · 4 Likes
article thumbnail
Best Practices for Salesforce Data Management and Security
Are you doing enough to ensure data security while adhering to data hygiene best practices? Here, learn Salesforce data management and security best practices.
September 2, 2024
by Ilya Dudkin DZone Core CORE
· 3,264 Views · 1 Like
article thumbnail
From Transparency to the Perils of Oversharing
In this article, learn that while transparency is often hailed as a pillar of Agile practices, navigating its complexities with care is essential.
September 2, 2024
by Stefan Wolpers DZone Core CORE
· 4,323 Views · 3 Likes
article thumbnail
Going on a Threat Hunt: Advanced Strategies for Defending the Digital Frontier
By seeking out and identifying hidden threats, security teams can neutralize advanced attacks that might evade automated systems.
September 2, 2024
by Pratik Prakash DZone Core CORE
· 4,083 Views · 2 Likes
article thumbnail
Zero Trust and Its Impact on Cybersecurity
With the rise of remote work and the dissolution of the traditional security perimeter, enterprises have shifted to a Zero-Trust model to improve security.
September 2, 2024
by Siri Varma Vegiraju DZone Core CORE
· 14,048 Views · 3 Likes
  • Previous
  • ...
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: