DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
Securing Your Software Supply Chain with JFrog and Azure
Register Today

The Latest Security Topics

article thumbnail
10 Effective Strategies To Safeguard Your IoT Network From Threats
The security of IoT networks is a challenge that needs to be addressed at a global scale. This blog will uncover some risks associated with IoT network security.
June 1, 2023
by Kamal R
· 2,795 Views · 1 Like
article thumbnail
The Role of Automation in Streamlining DevOps Processes
Automation plays a vital role in DevOps, streamlining processes, improving efficiency, and reducing errors.
June 1, 2023
by Sahil D
· 2,284 Views · 2 Likes
article thumbnail
Never Use Credentials in a CI/CD Pipeline Again
With the proliferation of OpenID Connect, is there any reason to use stored long-term credentials? I would argue that there is not.
May 31, 2023
by Sushil Kambampati
· 3,296 Views · 1 Like
article thumbnail
Decoding eBPF Observability: How eBPF Transforms Observability as We Know It
Let’s look at eBPF. What is the technology, how is it impacting observability, and how does it compare with existing observability practices?
May 31, 2023
by Samyukktha T
· 2,589 Views · 3 Likes
article thumbnail
Authorization: Get It Done Right, Get It Done Early
Use early and decoupled authorization for secure software development and consider important implementation factors.
May 30, 2023
by Emre Baran
· 3,129 Views · 1 Like
article thumbnail
How Web3 Is Driving Social and Financial Empowerment
Web3 has opened doors to possible financial services use cases for DeFi through monetization, governance, and ownership, leading to financial empowerment.
May 30, 2023
by Adam Lieberman
· 2,221 Views · 1 Like
article thumbnail
Incident Response Guide
We'll discuss incident response, including triaging and troubleshooting, and show real-life examples.
May 30, 2023
by Vishal Padghan
· 2,569 Views · 1 Like
article thumbnail
Demystifying SPF Record Limitations
Email phishing attacks create big cybersecurity issues for organizations; SPF record limitations, SPF flattening, and PermError resolution may be the magic wand.
May 30, 2023
by John Ejiofor
· 2,064 Views · 1 Like
article thumbnail
Enhancing Collaboration and Efficiency in DataOps With Git
In this article, we will explore how Git can improve the efficiency of DataOps and delve into the significance of DataOps for large-scale models.
May 30, 2023
by Zongwen Li
· 3,087 Views · 1 Like
article thumbnail
Laravel vs. Django: A Head-to-Head Comparison
Comparison of Django and Laravel based on performance, security, scalability, and learning. Provides advice and highlights key differences.
May 30, 2023
by Vipul Tanna
· 1,917 Views · 2 Likes
article thumbnail
Comparing Cloud Hosting vs. Self Hosting
In this article, we will zoom in on two popular software programs: Cloud Hosting and Self Hosting.
May 29, 2023
by Daniel Onugha
· 3,463 Views · 2 Likes
article thumbnail
RBAC With API Gateway and Open Policy Agent (OPA)
In this article, you will learn how to enable role-based access control (RBAC) with open-source API Gateway Apache APISIX and Open Policy Agent (OPA).
May 25, 2023
by Bobur Umurzokov
· 4,746 Views · 4 Likes
article thumbnail
AI Technology Is Drastically Disrupting the Background Screening Industry
Discover how AI technology is revolutionizing the background screening industry, offering more efficient and cost-effective solutions than ever before.
May 25, 2023
by Ryan Kh
· 3,814 Views · 1 Like
article thumbnail
File Upload Security and Malware Protection
In this article, we implement several of the OWASP recommendations for file upload security. We also dive into malware scanning solutions.
May 25, 2023
by Austin Gil CORE
· 3,952 Views · 2 Likes
article thumbnail
Top 10 Pillars of Zero Trust Networks
Ten points to consider in order to achieve a zero trust network for microservices deployed in multicloud Kubernetes clusters.
May 24, 2023
by Debasree Panda
· 4,181 Views · 4 Likes
article thumbnail
DevOps Midwest: A Community Event Full of DevSecOps Best Practices
DevOps Midwest 2023 brought together experts in scale, availability, and security best practices. Read some of the highlights from this DevSecOps-focused event.
May 24, 2023
by Dwayne McDaniel
· 2,697 Views · 1 Like
article thumbnail
SRE vs. DevOps
In this article, you will gain an understanding of the distinctions between Site Reliability Engineering (SRE) and DevOps.
May 24, 2023
by Pradeep Gopalgowda
· 3,415 Views · 2 Likes
article thumbnail
Identify and Fix XSS Vulnerabilities in Your Web App
Cross-site scripting (XSS) is the most severe consequence of poorly implemented frontends. Learn how to protect any front-end app from the XSS threat.
May 24, 2023
by Conty Write
· 2,119 Views · 1 Like
article thumbnail
Auditing Tools for Kubernetes
These tools explain how they can help maintain security and compliance by identifying and mitigating vulnerabilities within a Kubernetes environment.
May 24, 2023
by Vasilii Kulazhenkov
· 5,799 Views · 3 Likes
article thumbnail
8 Data Anonymization Techniques to Safeguard User PII Data
As more personal information is being collected and analyzed by organizations, the need to protect an individual's privacy and prevent the misuse or unauthorized access of the personal data comes with it.
May 23, 2023
by Yash Mehta
· 2,245 Views · 1 Like
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: