DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
The Latest "Software Integration: The Intersection of APIs, Microservices, and Cloud-Based Systems" Trend Report
Get the report

The Latest Security Topics

article thumbnail
Building Security Champions
Security Champions help you scale your security programs. This article describes how to build up an amazing program in your organization!
December 26, 2022
by Tanya Janca
· 4,344 Views · 2 Likes
article thumbnail
Adopting Kubernetes? Here Are Some Pitfalls You Should Avoid
Think you know K8s? It's always wise to learn more – particularly when doing so contextualizes your understanding.
December 26, 2022
by Luca Galante
· 3,941 Views · 3 Likes
article thumbnail
What Is a Security Operation Center and How Do SOC Teams Work?
In this article, we will explore how security operation centers (SOCs) help you monitor, identify and prevent cyber threats to safeguard your IT environments.
December 23, 2022
by Vishal Padghan
· 2,967 Views · 1 Like
article thumbnail
Significant Trends to Know in Data Infrastructure 2023
Data infrastructure is changing every second! Read this blog to know the recent trends in a data infrastructure that can influence the upcoming future in 2023.
December 23, 2022
by Sonia Rathore
· 3,157 Views · 1 Like
article thumbnail
EDR vs Antivirus: What You Need to Know
While antivirus and endpoint detection and response solutions aim to prevent endpoint security threats, they do it in very different ways.
December 23, 2022
by Anastasios Arampatzis
· 3,431 Views · 1 Like
article thumbnail
CyberTech NYC 2022: Securing the Future Together
GitGuardian joined dozens of security companies in New York City to share knowledge about the ever-shifting enterprise landscape.
December 22, 2022
by Dwayne McDaniel
· 3,155 Views · 1 Like
article thumbnail
Kafka Integration With Spring Cloud
Using Kafka Streams with Spring Cloud Streams.
December 22, 2022
by Nicolas Duminil CORE
· 4,879 Views · 2 Likes
article thumbnail
Using Truffle L2 Boxes to Bridge Blockchain Networks
Building dApps that interoperate between L1s and L2s can be difficult. Let's look at using the Optimism Bridge Truffle Box as an easy way to bridge Ethereum and Optimism.
December 21, 2022
by John Vester CORE
· 40,210 Views · 4 Likes
article thumbnail
Secure Smart Contract Tools: An End-to-End Developer’s Guide
Writing secure smart contracts is hard. In this article, I'll walk through 22 security tools from across web3 to help make your next smart contract even more secure.
December 19, 2022
by Michael Bogan CORE
· 2,866 Views · 1 Like
article thumbnail
A Brief Introduction to SBOM and How to Use It With CI
Learn more about SBOM (Software Bills of Materials), why you should use it, what the standards are, and how to automate it with Continuous Integration.
December 19, 2022
by Tiexin Guo
· 5,808 Views · 1 Like
article thumbnail
Surviving the Incident
Effective incident response (IR) playbooks are the best antidote to unpredictable attacks. Learn how to build a tailored guide for handling security incidents.
December 19, 2022
by Roderick Chambers
· 4,107 Views · 1 Like
article thumbnail
Building a Secure Mobile App in the Cloud
This guide on secure mobile applications shows top security vulnerabilities, OWASP's best practices for building/testing iOS and Android applications, and more.
December 19, 2022
by Boris Zaikin CORE
· 4,857 Views · 3 Likes
article thumbnail
Improve Microservices Security by Applying Zero-Trust Principles
Discover how the zero-trust principles can be applied in a microservices environment and what security controls should be implemented on the back end.
December 18, 2022
by Apostolos Giannakidis
· 6,950 Views · 8 Likes
article thumbnail
Get Started On Celo With Infura RPC Endpoints
Learn about the Celo layer-one blockchain network and how to start building on it using Infura RPC endpoints.
December 17, 2022
by Paul McAviney CORE
· 5,421 Views · 2 Likes
article thumbnail
Software Supply Chain Security Checklist
Software security is a critical part of any product. Follow this checklist to discover five keys to keeping software secure from creation to delivery.
December 17, 2022
by Justin Albano CORE
· 3,303 Views · 1 Like
article thumbnail
ELI5: How Does a TPM Work?
A TPM is a special chip that keeps all your secrets safe on your phone or computer. But what is going on in there?
December 16, 2022
by Nick Hodges CORE
· 2,662 Views · 1 Like
article thumbnail
WordPress Core — Unauthenticated Blind SSRF
In this blog post, Sonar's R and D team describes a surprisingly simple vulnerability in WordPress’s implementation of pingbacks.
December 16, 2022
by Thomas Chauchefoin
· 6,396 Views · 2 Likes
article thumbnail
DevSecOps Easter Eggs
Being aware of the blind spots in an organization (and people) can go a long way toward defending against the unknowns. But where to start? Find out here.
December 16, 2022
by Julie Tsai
· 3,202 Views · 4 Likes
article thumbnail
How to Block API Runtime Threats
We all want a safe environment wherever we go, but we have to hope for the best and prepare for the worst (and prepare to be surprised!). It's the same with apps.
December 16, 2022
by Ross Moore
· 3,331 Views · 2 Likes
article thumbnail
Securing Your Containers—Top 3 Challenges
There are several pitfalls while securing containers and containerized ecosystems. Let's discuss the top three challenges in detail so you can manage them.
December 16, 2022
by Komal J Prabhakar
· 4,664 Views · 1 Like
  • Previous
  • ...
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: