DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
Securing Your Software Supply Chain with JFrog and Azure
Register Today

The Latest Security Topics

article thumbnail
Powering Manufacturing With MLOps
In this article, readers will learn about MLOps (machine learning operations), including background information about MLOps and some of the benefits of MLOps.
February 13, 2023
by Devin Partida
· 4,802 Views · 1 Like
article thumbnail
Authenticate Users via Face Recognition on Your Website or App
Learn how to authenticate users on a typical website or web application via face recognition instead of the traditional login/password pair.
February 13, 2023
by Hrishikesh Pathak
· 2,628 Views · 1 Like
article thumbnail
How To Scan a URL for Malicious Content and Threats in Java
This article discusses some of the threats posed by URL links and provides a free-to-use URL Security API with complementary, ready-to-run Java code snippets.
February 13, 2023
by Brian O'Neill CORE
· 6,248 Views · 2 Likes
article thumbnail
Generative AI for DevOps: A Practical View
Generative AI empowers DevOps teams to eliminate tedious repetition, strengthen automation, and condense complex workflows into simple conversational actions.
February 13, 2023
by Amit Eyal Govrin
· 8,197 Views · 3 Likes
article thumbnail
The Evolution of Cloud-Native Authorization
There's been a lot of buzz about fine-grained access control in the past several years. Here's an overview of the key ideas and best practices that have emerged.
February 12, 2023
by Noa Shavit
· 6,429 Views · 5 Likes
article thumbnail
Which Type of MFA Is Most Secure?
When implementing multi-factor authentication, we face many options: social media login, email code confirmation, text SMS confirmation, authentication apps, and biometric authentication. While each method has advantages and drawbacks, the most secure type of MFA to implement is often authentication apps.
February 10, 2023
by Zac Amos
· 2,488 Views · 1 Like
article thumbnail
Securing Admin Access to Apache APISIX
Secure API gateways are valuable targets for bad actors. In this article, explore several non-exclusive options to consider to secure Apache APISIX.
February 10, 2023
by Nicolas Fränkel CORE
· 2,484 Views · 1 Like
article thumbnail
Release Management: Is Your Product Ready for Success?
You never get a second chance to make a first impression. A bad first release can ruin months of work. How do we maximize the probability of success?
February 10, 2023
by Tomas Fernandez
· 2,943 Views · 1 Like
article thumbnail
Get Up to Speed With the Latest Cybersecurity Standard for Consumer IoT
With new regulations on the horizon, device manufacturers and developers should see it as best practice to get up to speed with this ETSI cybersecurity standard.
February 10, 2023
by Carsten Rhod Gregersen
· 4,405 Views · 2 Likes
article thumbnail
Integrating DevOps with IT Service Management (ITSM): Best Practices for Effective DevOps-ITSM Integration
This integration enables organizations to create a more collaborative and efficient environment for their software delivery processes.
February 9, 2023
by Joseph owino
· 2,870 Views · 3 Likes
article thumbnail
What Is Blockchain Trilemma and How Could It Be Solved?
The blockchain trilemma is the most complicated problem to fix. This piece perfectly explains the blockchain trilemma and how to solve it.
Updated February 9, 2023
by Mary Forest
· 2,312 Views · 1 Like
article thumbnail
Introduction to Kubernetes Event-Driven Auto-Scaling (KEDA)
Explore KEDA (Kubernetes Event-Driven Autoscaling), an effective autoscaling solution for Kubernetes workloads, and learn KEDA architecture and its benefits.
February 9, 2023
by Jyoti Sahoo
· 6,097 Views · 2 Likes
article thumbnail
Test Data Compliance: How to Rewrite Your Organization’s DNA
Rich Jordan explores how test data compliance issues are symptoms of deeper challenges, and how unpicking these root problems can accelerate the whole SDLC.
February 9, 2023
by Rich Jordan
· 2,857 Views · 3 Likes
article thumbnail
How To Use MQTT in Golang
How to use paho.mqtt.golang client library in the Golang project, and implement the connection, subscription, and messaging between the client and MQTT broker.
February 8, 2023
by Zhiwei Yu
· 2,519 Views · 1 Like
article thumbnail
What Is an API Integration Example?
Learning about API integrations and want to learn more? Here’s an API integration example that shows everything from API to API and all the pieces in between.
February 8, 2023
by Bru Woodring
· 4,434 Views · 1 Like
article thumbnail
Legacy Code Refactoring: Tips, Steps, and Best Practices
Read this guide on how to transform your outdated systems into modern, efficient, and maintainable software with tips, crucial steps, and best practices.
February 8, 2023
by Pavel Tantsiura
· 7,661 Views · 1 Like
article thumbnail
Your Go-to Guide to Develop Cryptocurrency Blockchain in Node.Js
This article will explain how to develop a cryptocurrency blockchain using Node.Js with this comprehensive guide.
February 8, 2023
by Ryan Jason
· 3,156 Views · 1 Like
article thumbnail
Defending Against Data Breaches: An Overview of Cyber Insurance for MSPs
Managed Service Providers (MSPs) are at risk of cyber attacks due to the sensitive data they handle for their clients.
February 8, 2023
by Alex Tray
· 1,915 Views · 1 Like
article thumbnail
Securing the Clouds: An Evaluation of Cloud Security Solutions
As organizations increasingly leverage the cloud to store and process data, it is essential to consider the security implications of these cloud-based solutions.
February 8, 2023
by tarek rakhiess
· 3,753 Views · 1 Like
article thumbnail
What Is Browser Sandboxing?
This article will explore what browser sandboxing is, the benefits and importance of the different types of sandboxing, and how to implement sandboxing.
February 8, 2023
by Salman Khan
· 4,809 Views · 1 Like
  • Previous
  • ...
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: