DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

SBOMs are essential to circumventing software supply chain attacks, and they provide visibility into various software components.

The Latest Security Topics

article thumbnail
How to Fix the OWASP Top 10 Vulnerability in Angular 18.1.1v
Discuss the configurations and see examples of how to mitigate security vulnerabilities in an Angular web application 18.1.1v in detail.
August 1, 2024
by Kalyan Gottipati
· 6,732 Views · 1 Like
article thumbnail
Vulnerability Management in DevOps Environments
Vulnerability management in DevOps integrates security into the development workflow to identify and fix vulnerabilities throughout the software lifecycle.
July 31, 2024
by Favour Efeoghene
· 9,811 Views · 3 Likes
article thumbnail
Why Do We Need to Keep Our Builds Green?
You need a CI/CD pipeline, and you need to keep it green. Have you ever thought what that means exactly? Why are we so focused on having green builds? Let's find out!
July 30, 2024
by Istvan Zoltan Nagy
· 9,771 Views · 3 Likes
article thumbnail
Guarding Privacy: Cutting-Edge Technologies for Data Protection
Discover how advanced technologies are revolutionizing data security. Learn about encryption, blockchain, and machine learning in the fight against cyber threats.
July 29, 2024
by Saigurudatta Pamulaparthyvenkata
· 2,831 Views · 2 Likes
article thumbnail
Don’t Get Hacked! Essential Cybersecurity Tips You Need To Know
Exploring common cybersecurity threats online and teaching best practices to build protections for yourself and those most important to you.
July 29, 2024
by Manoj Boopathi Raj
· 2,283 Views · 1 Like
article thumbnail
5 Innovative Cybersecurity Measures App Developers Should Incorporate in the Digital Transformation Race
Digital transformation is key for organizations adapting to modern threats. In this article, I'll cover 5 measures app developers should incorporate.
July 26, 2024
by Alon Gehlber DZone Core CORE
· 5,615 Views · 1 Like
article thumbnail
How to Secure Your Angular Apps: End-to-End Encryption of API Calls
Explore an example of implementing end-to-end encryption of API calls in your secure web app built with Angular.
July 26, 2024
by Kalyan Gottipati
· 9,602 Views · 3 Likes
article thumbnail
How To Implement a Gateway With Spring Cloud
Learn how to implement a gateway component for a microservice system with the Spring Cloud Gateway package.
July 25, 2024
by Mario Casari
· 9,619 Views · 2 Likes
article thumbnail
Pilot VPC and Advanced NAT: Securely Connect Overlapping Networks to AWS VPC
This article introduces a new method for creating secure connections between overlapping on-premise networks and Amazon VPC via a site-to-site VPN.
July 25, 2024
by Narinder Singh Kharbanda
· 4,505 Views · 3 Likes
article thumbnail
How Behavioral Biometrics Enhances Fraud Prevention
Behavioral biometrics allows for higher fraud detection accuracy and fewer false positives compared to rules-based alternatives. Here's how to implement it.
July 24, 2024
by Zac Amos
· 3,010 Views · 1 Like
article thumbnail
Security Challenges in AI-Powered Applications
In this article, we're diving deep into these risks, looking at real-world examples, and discussing practical ways to protect these AI-driven solutions.
July 23, 2024
by Mayank Singhi
· 3,959 Views · 2 Likes
article thumbnail
Shadow IT: The Unavoidable Reality and How To Embrace It Safely
Discover how to balance productivity and security in the age of Shadow IT. Learn from CISO Chris Denbigh-White's insights on managing unauthorized tech use.
July 23, 2024
by Tom Smith DZone Core CORE
· 3,037 Views · 1 Like
article thumbnail
Empowering Developers in Code Security
Improve workflows with collaborative incident management to minimize vulnerabilities and enhance productivity while empowering developers via command-line tools.
July 22, 2024
by Dwayne McDaniel
· 4,086 Views · 2 Likes
article thumbnail
A Guide to Security Controls for Risk-Based API Protection
In this post, we are going to navigate risk-based API security controls which are essential in helping you construct more solid and tamper-proof APIs.
July 19, 2024
by Kalyan Gottipati
· 5,078 Views · 2 Likes
article thumbnail
Poetry Explained: Perils of the Unpinned Dependencies
Poetry conquers Python's dependency madness with version pinning and conflict resolution, guaranteeing smooth, stable, and hassle-free releases.
July 17, 2024
by Prince Bose
· 5,235 Views · 7 Likes
article thumbnail
Poisoning AI Brain: The Hidden Dangers of Third-Party Data and Agents in AI Systems
Backdoor attacks in LLMs involve hidden triggers embedded during training that activate harmful actions under specific conditions.
July 16, 2024
by Gaurav Puri
· 4,441 Views · 3 Likes
article thumbnail
8 Ways AI Can Maximize the Value of Logs
Logs are filled with the information needed to monitor and understand systems. Let’s look at eight ways that AI can maximize the value of logs.
July 16, 2024
by Michael Bogan DZone Core CORE
· 4,767 Views · 2 Likes
article thumbnail
Developing Security-By-Design Across the Zoho Application Suite
How Zoho's zero-trust cybersecurity and data privacy policies for its own 100-million-plus users inform their new Integrated Security Stack suite.
July 16, 2024
by Jason English
· 2,991 Views · 1 Like
article thumbnail
How Open Source Project Tetragon Is Evolving Security via eBPF
Learn how Tetragon leverages eBPF to revolutionize runtime security, offering deep observability and real-time enforcement for cloud-native environments.
July 16, 2024
by Tom Smith DZone Core CORE
· 4,063 Views · 4 Likes
article thumbnail
SBOMs in Action: Securing Your Golden AMIs From Build to Runtime
Learn how to build secure, immutable golden AMIs on AWS with SBOMs, Cosign signatures, and continuous validation for robust cloud security.
July 15, 2024
by Kiran Sama
· 3,030 Views · 1 Like
  • Previous
  • ...
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: