DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Migrate, Modernize and Build Java Web Apps on Azure: This live workshop will cover methods to enhance Java application development workflow.

Modern Digital Website Security: Prepare to face any form of malicious web activity and enable your sites to optimally serve your customers.

Kubernetes in the Enterprise: The latest expert insights on scaling, serverless, Kubernetes-powered AI, cluster security, FinOps, and more.

A Guide to Continuous Integration and Deployment: Learn the fundamentals and understand the use of CI/CD in your apps.

The Latest Security Topics

article thumbnail
How to Configure an HTTPS Endpoint for Mule Applications With One-Way SSL
In this tutorial, we will explore the process of setting up an HTTPS endpoint in a Mule Application by configuring TLS with a Keystore.
August 21, 2023
by Ashish Jha
· 11,388 Views · 4 Likes
article thumbnail
Securing the Software Supply Chain: Chainguard Builds on Foundational Innovation
Automation, simplicity, and making robust supply chain security a seamless default for developers is the next evolution of software supply chain security.
August 21, 2023
by Tom Smith DZone Core CORE
· 3,063 Views · 2 Likes
article thumbnail
Android App Modularization: 4 Useful Tips to Start
Modularizing an Android app means breaking it into self-contained modules that can be assembled to form the complete app.
August 21, 2023
by Albert Gonzalez
· 2,278 Views · 1 Like
article thumbnail
Navigating the PAM Landscape: Overcoming Deployment Barriers for Modern Security
PAM SaaS-based platform enables organizations to achieve full visibility, security, control, and reporting across every user on every device in an organization.
August 19, 2023
by Tom Smith DZone Core CORE
· 3,041 Views · 1 Like
article thumbnail
Combatting the OpenSSH Vulnerability
The recent security flaw in OpenSSH sheds light on the persistent potential for vulnerabilities in even widely-used and reviewed software.
August 18, 2023
by John Campbell
· 3,209 Views · 1 Like
article thumbnail
Four Practical Ways To Make Your Software More Secure
Software security can make or break your business. Implementing security into the development process and consistent training can help you keep your product safe.
August 18, 2023
by Syed Balkhi
· 3,232 Views · 1 Like
article thumbnail
Seeing the Forest for the Trees: Data Preservation Starts With a Keen Eye
Initiating a successful data preservation strategy hinges on the foundation of meticulous observation and an unwavering focus on details.
August 18, 2023
by Michael Chukwube
· 3,996 Views · 3 Likes
article thumbnail
The Rising Risks and Opportunities in API Security
Hackers used to have to know about technology to propagate and attack, now hackers can learn how to hack an API over the weekend.
August 18, 2023
by Tom Smith DZone Core CORE
· 4,139 Views · 1 Like
article thumbnail
Edge Data Platforms, Real-Time Services, and Modern Data Trends
This article will explore what edge data platforms and real-time services are, why they are important, and how they can be used.
August 18, 2023
by Margo McCabe
· 4,696 Views · 2 Likes
article thumbnail
JWT Token Authentication in Angular 14 and .NET Core 6 Web API
This article discusses all JWT Authentication in Angular 14 step-by-step and how to store tokens in local storage and use them inside the product application.
August 17, 2023
by Jaydeep Patil
· 4,221 Views · 1 Like
article thumbnail
APIs in Motion: Keep Your APIs Up-To-Date
Explore the reasons behind API updates, including technology advancements, changing user needs, security concerns, and performance optimization.
August 17, 2023
by Dana Thomas
· 3,035 Views · 1 Like
article thumbnail
Control Access To Private Data Using Azure Storage Shared Access Signatures
Azure Storage SAS (Shared Access Signature) is a security token that provides limited access rights and permissions to Azure Storage resources.
August 17, 2023
by Abhishek Shukla
· 2,652 Views · 2 Likes
article thumbnail
The Enterprise Browser: A Security-Hardened Productivity Platform for the Future of Remote Work
The browser will become a platform from which enterprises can distribute software, collect intelligence, control access, and securely enable remote work.
August 17, 2023
by Tom Smith DZone Core CORE
· 2,501 Views · 1 Like
article thumbnail
“Auth” Demystified: Authentication vs Authorization
People tend to lump authorization and authentication together and refer to them as “auth," but these two processes couldn't be more different.
August 16, 2023
by Noa Shavit
· 2,603 Views · 2 Likes
article thumbnail
Securely Managing, Distributing, and Scaling Secrets Across Multiple Kubernetes Clusters
Fetch secrets from external secret management systems and securely distribute their content to a multitude of Kubernetes clusters.
August 16, 2023
by Gianluca Mardente
· 3,653 Views · 1 Like
article thumbnail
Blueprint for Seamless Software Deployment: Insights by a Tech Expert
Embark on a journey into the world of software deployment, guided by a tech enthusiast through time-tested practices that guarantee a harmonious and triumphant process.
August 16, 2023
by Muzammil Rawjani
· 1,626 Views · 3 Likes
article thumbnail
How To Install Istio Using Helm Chart
Follow the steps to install the open-source Istio service mesh in your Kubernetes cluster using Helm charts.
August 16, 2023
by Pulak Das
· 2,863 Views · 2 Likes
article thumbnail
5 Strategies for Strengthening MQTT Infrastructure Security
This article provides a comprehensive overview of strategies to enhance operating system security from multiple perspectives.
August 16, 2023
by Weihong Zhang
· 2,749 Views · 1 Like
article thumbnail
DARPA Taps Hackers to Fortify Critical Software Against Cyber Threats
Competition challenges top AI and cybersecurity talent to automatically find and fix software vulnerabilities, defend critical infrastructure from cyberattacks
August 16, 2023
by Tom Smith DZone Core CORE
· 3,264 Views · 1 Like
article thumbnail
Authentication vs. Authorization: What's the Difference?
Authentication and Authorization represent two fundamentally different aspects of security that work together in order to protect sensitive information.
August 15, 2023
by Advait Ruia
· 1,763 Views · 1 Like
  • Previous
  • ...
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: