DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

How does AI transform chaos engineering from an experiment into a critical capability? Learn how to effectively operationalize the chaos.

Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.

Are you a front-end or full-stack developer frustrated by front-end distractions? Learn to move forward with tooling and clear boundaries.

Developer Experience: Demand to support engineering teams has risen, and there is a shift from traditional DevOps to workflow improvements.

The Latest Security Topics

article thumbnail
Comprehensive Guide To Troubleshooting IPsec VPN Site-To-Site Connections With PSK on FortiGate Firewalls
Here’s a structured approach to diagnose and resolve common IPsec VPN problems between two sites: "Headquarter" and "Branch".
June 24, 2024
by Sanjay Poddar
· 8,660 Views · 2 Likes
article thumbnail
The Role of Kubernetes in Data Privacy and Protection
Kubernetes boosts data privacy and protection with secure container management, encryption, and access controls, ensuring safe data handling in modern applications.
June 20, 2024
by Michael Chukwube
· 6,744 Views · 2 Likes
article thumbnail
Optimizing Your Cloud Resources, Part 1: Strategies for Effective Management
In this article, explore options to optimize your cloud resources to enhance performance, reduce costs, and improve efficiency.
June 20, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 5,441 Views · 4 Likes
article thumbnail
IoT Needs To Get Serious About Security
Security issues in IoT have gotten worse, not better, and it's time we acknowledge that and fix it. It's long past time.
June 20, 2024
by David G. Simmons DZone Core CORE
· 7,793 Views · 4 Likes
article thumbnail
Transforming Modern Networking: The Unmatched Security of Secure Access Service Edge (SASE)
Secure Access Service Edge (SASE) enhances security by converging network and security services into a single, cloud-native architecture.
June 19, 2024
by Sanjay Poddar
· 2,724 Views · 2 Likes
article thumbnail
A Wake-up Call for Cloud Security: Insights From the Recent Snowflake Data Breach
A case study on the recent Snowflake data breach and deep dive into cloud security measures to fortify cloud environments.
June 19, 2024
by Venkata Nedunoori
· 3,383 Views · 1 Like
article thumbnail
Building Resilient Security Systems: Composable Security
The concept of composable security involves the integration of cybersecurity controls into architectural patterns, which are then implemented at a modular level.
June 18, 2024
by Deepa Ajish
· 3,468 Views · 3 Likes
article thumbnail
Unmasking the Danger: 10 Ways AI Can Go Rogue (And How to Spot Them)
Large language models pose risks like manipulation, cyberattacks, and unintended self-improvement, but safeguards are being developed.
June 18, 2024
by Indrajit Bhattacharya
· 2,387 Views · 1 Like
article thumbnail
Building an Internal TLS and SSL Certificate Monitoring Agent: From Concept to Deployment
Learn how an internal SSL/TLS certificate monitoring agent was built, including requirements, architecture, scheduling, integrations, and UI.
June 14, 2024
by Max Shash DZone Core CORE
· 7,924 Views · 4 Likes
article thumbnail
How Sigma Is Empowering Devs, Engineers, and Architects With Cloud-Native Analytics
Sigma CEO Mike Palmer reveals how the company's cloud-native platform is transforming data analytics for developers, engineers, and architects.
June 13, 2024
by Tom Smith DZone Core CORE
· 4,551 Views · 1 Like
article thumbnail
Securing the Future: The Role of Post-Quantum Cryptography
Learn how advances in quantum computing are revolutionizing computer capacities and computation times, but threatening current cryptographic systems.
June 13, 2024
by Frederic Jacquet DZone Core CORE
· 4,035 Views · 3 Likes
article thumbnail
Effortless Credential Management in Azure: The Power of Managed Identities
Managed Identities simplify access to Azure resources, eliminating the need for connection strings and manual rotation of secrets.
June 13, 2024
by Siri Varma Vegiraju DZone Core CORE
· 4,254 Views · 1 Like
article thumbnail
Exploring the Role of Data Analytics in SOC Alert Tuning
Learn how Security Operations Centers (SOCs) use data analytics and AI to strengthen cybersecurity defenses against malefactors.
June 13, 2024
by Anastasios Arampatzis
· 3,363 Views · 1 Like
article thumbnail
Smart Network Onboarding: Revolutionizing Connectivity With AI and Automation
By integrating AI and automation, organizations can anticipate and mitigate connectivity issues, customize onboarding procedures, and enforce security standards.
June 11, 2024
by Raghavaiah Avula
· 4,266 Views · 1 Like
article thumbnail
Revolutionizing API Security in the Era of GenAI: An Architect’s Perspective
AI-powered API security solutions are crucial for addressing the challenges posed by GenAI, providing comprehensive visibility, and proactive governance.
June 11, 2024
by Vaibhav Malik
· 3,039 Views · 1 Like
article thumbnail
Why Choose Bug Bounty Programs? (Benefits and Challenges Explained)
Bug Bounty programs can help effectively identify and mitigate vulnerabilities when combined with secure development practices and proper vulnerability management.
June 10, 2024
by Alex Vakulov
· 2,483 Views · 3 Likes
article thumbnail
Analysis of Flubot Malware on Android OS
Explore research that focuses on the possible methods of Flubot malware's signature, behavior, and future strikes.
June 10, 2024
by Priyank Singh
· 3,327 Views · 1 Like
article thumbnail
Embracing Responsible AI: Principles and Practices
This article provides context on embracing responsible AI along with guidelines for developing AI systems that are transparent, responsible, and lasting.
June 7, 2024
by Naga Santhosh Reddy Vootukuri DZone Core CORE
· 3,038 Views · 3 Likes
article thumbnail
Mocking Dependencies and AI Is the Next Frontier in Vue.js Testing
Mocking dependencies in Vue.js tests is crucial for isolating components, and ensures reliable, efficient, and comprehensive testing in controlled environments.
June 6, 2024
by Anton Lucanus DZone Core CORE
· 11,597 Views · 2 Likes
article thumbnail
Dependency Injection
One of the foundational techniques in Java backend development, helping build resilient and scalable applications tailored to modern software demands.
June 5, 2024
by German Urikh
· 7,632 Views · 3 Likes
  • Previous
  • ...
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: