DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

How does AI transform chaos engineering from an experiment into a critical capability? Learn how to effectively operationalize the chaos.

Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.

Are you a front-end or full-stack developer frustrated by front-end distractions? Learn to move forward with tooling and clear boundaries.

Developer Experience: Demand to support engineering teams has risen, and there is a shift from traditional DevOps to workflow improvements.

The Latest Security Topics

article thumbnail
Enterprise Data Loss Prevention (DLP) Security Policies and Tuning
Effective DLP policies balance security and usability, tailored to business needs with vendor support for agility and risk reduction.
June 2, 2025
by Priyanka Neelakrishnan
· 1,669 Views · 1 Like
article thumbnail
Security by Design: Building Full-Stack Applications With DevSecOps
Secure Angular and Node.js apps end-to-end with DevSecOps, integrating security across frontend, backend, and CI/CD pipelines.
May 29, 2025
by Bhanu Sekhar Guttikonda
· 3,118 Views · 2 Likes
article thumbnail
When Airflow Tasks Get Stuck in Queued: A Real-World Debugging Story
Fixed Airflow 2.2.2 tasks stuck in "queued" state by backporting a patch from v2.6.0, optimizing scheduler config, and deploying temporary workarounds.
May 29, 2025
by Gurmeet Saran
· 3,065 Views · 3 Likes
article thumbnail
How GitHub Copilot Helps You Write More Secure Code
GitHub Copilot can help you write more secure code — but only if you guide it correctly. This post walks through real examples.
May 29, 2025
by Ravi Teja Thutari
· 2,453 Views · 3 Likes
article thumbnail
A Guide to Auto-Tagging and Lineage Tracking With OpenMetadata
Learn how to automate PII tagging, metadata management, and SQL lineage tracking with GPT-4, OpenMetadata, dbt, Trino, and Python for smarter data governance.
May 27, 2025
by Sreenath Devineni DZone Core CORE
· 3,488 Views
article thumbnail
Proactive Security in Distributed Systems: A Developer’s Approach
Distributed systems require early security focus to avoid reworks. This article explores trends and developer defense approaches.
May 23, 2025
by Singaravelu Ambikapathi
· 2,677 Views
article thumbnail
The Role of AI in Identity and Access Management for Organizations
This article examines how AI enhances Identity and Access Management (IAM) by improving security, efficiency, and adaptability to evolving cyber threats.
May 22, 2025
by Nikhil Kapoor
· 3,371 Views · 4 Likes
article thumbnail
Analyzing Techniques to Provision Access via IDAM Models During Emergency and Disaster Response
Exploring and analyzing the scope, benefits, and use cases of different access control models during emergency and disaster response.
May 22, 2025
by Atish Kumar Dash
· 2,243 Views · 1 Like
article thumbnail
IoT and Cybersecurity: Addressing Data Privacy and Security Challenges
The iot brings forth an enormous transformation in how human beings operate with technology. The system delivers advantages that benefit both efficiency and convenience.
May 21, 2025
by Dennis Helfer
· 3,189 Views
article thumbnail
Securing the Future: Best Practices for Privacy and Data Governance in LLMOps
This article covers strategies for safeguarding sensitive data, enforcing compliance, and embedding responsible AI principles throughout the model lifecycle.
May 21, 2025
by Rajarshi Tarafdar
· 2,432 Views · 1 Like
article thumbnail
Prioritizing Cloud Security Risks: A Developer's Guide to Tackling Security Debt
Cloud findings are endless don’t treat them equally. Prioritize based on real risk, context, and impact. Fix the right things, not everything.
May 21, 2025
by Sam Prakash Bheri
· 2,653 Views · 1 Like
article thumbnail
Cloud Security and Privacy: Best Practices to Mitigate the Risks
Ransomware attacks, outages, and human errors all threaten your data. What cloud security and privacy measures should you take to address them?
May 20, 2025
by Milosz Jesis
· 2,611 Views · 2 Likes
article thumbnail
Building Resilient Identity Systems: Lessons from Securing Billions of Authentication Requests
Learn how resilient identity systems combine AI, automation, and zero-trust to defend against threats while maintaining secure and seamless user access.
May 19, 2025
by Kalyan Chakradhar Regula
· 2,012 Views
article thumbnail
Endpoint Security Controls: Designing a Secure Endpoint Architecture, Part 2
This outlines a layered approach to endpoint security, covering Zero Trust, Secure by Default, device approval, hardening, patching, malware protection, and encryption.
May 16, 2025
by Akanksha Pathak DZone Core CORE
· 4,189 Views · 1 Like
article thumbnail
Secure by Design: Modernizing Authentication With Centralized Access and Adaptive Signals
Discover a scalable approach to centralized authentication using modern identity providers, reducing risk and improving access across enterprise systems.
May 16, 2025
by Sumana Malkapuram
· 2,662 Views
article thumbnail
Endpoint Security Controls: Designing a Secure Endpoint Architecture, Part 1
This outlines a layered approach to endpoint security, covering Zero Trust, Secure by Default, device approval, hardening, patching, malware protection, and encryption.
May 15, 2025
by Akanksha Pathak DZone Core CORE
· 4,118 Views · 2 Likes
article thumbnail
Detection and Mitigation of Lateral Movement in Cloud Networks
Learn how hackers bypass lateral movement detection, their advanced techniques, and practical strategies like microsegmentation and AI to secure your network.
May 15, 2025
by Tanvir Kaur
· 5,140 Views · 1 Like
article thumbnail
Developers Beware: Slopsquatting and Vibe Coding Can Increase Risk of AI-Powered Attacks
Slopsquatting and vibe coding are fueling a new wave of AI-driven cyberattacks, exposing developers to hidden risks through fake, hallucinated packages.
May 14, 2025
by Aminu Abdullahi
· 4,120 Views · 2 Likes
article thumbnail
FIPS 140-3: The Security Standard That Protects Our Federal Data
Learn how FIPS 140-3, NIST's latest cryptographic standard, enhances security with zero trust and encryption for protecting sensitive federal data.
May 14, 2025
by Gireesh Punathil
· 3,594 Views · 1 Like
article thumbnail
Understanding IEEE 802.11(Wi-Fi) Encryption and Authentication: Write Your Own Custom Packet Sniffer
Learn about the most common encryption and authentication methods per the IEEE 802.11 standards, how to write your own packet sniffer and use Wireshark.
May 14, 2025
by Rahul Nagraj
· 3,594 Views · 2 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: