DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Security Topics

article thumbnail
5 Subtle Indicators Your Development Environment Is Under Siege
Threat actors now target SDLC stages. Spot five key indicators of compromise and reinforce dev pipeline security with early detection and response.
May 13, 2025
by Raj Mallempati
· 2,763 Views · 2 Likes
article thumbnail
AI-Based Threat Detection in Cloud Security
Learn how AI enhances cloud security with advanced threat detection methods like supervised learning, LLMs, and self-healing systems, tackling modern challenges.
May 12, 2025
by Tanvir Kaur
· 3,494 Views
article thumbnail
How Trustworthy Is Big Data?
Big data offers potential, but trust issues arise from poor quality, security, and accuracy. Organizations need strategy, governance, and training to ensure reliability.
May 12, 2025
by Dilip Kumar Rachamalla
· 2,911 Views
article thumbnail
Immutable Secrets Management: A Zero-Trust Approach to Sensitive Data in Containers
Immutable secrets and Zero-Trust on Amazon Web Services boost container security, delivery, and resilience, aligning with ChaosSecOps for DevOps awards.
May 9, 2025
by Ramesh Krishna Mahimalur
· 4,596 Views · 4 Likes
article thumbnail
Building Enterprise-Ready Landing Zones: Beyond the Initial Setup
A successful landing zone requires a carefully customized foundation that addresses organizational needs rather than relying on default cloud provider templates.
May 7, 2025
by Gaurav Mittal
· 3,485 Views · 1 Like
article thumbnail
Cookies Revisited: A Networking Solution for Third-Party Cookies
Understand cookies in web apps, their types, and how to solve third-party cookie issues for cross-domain iFrames with effective network configurations.
May 7, 2025
by Dipankar Saha
· 3,048 Views
article thumbnail
It’s Not About Control — It’s About Collaboration Between Architecture and Security
Should architecture report to security? Or should security follow architectural decisions? This article breaks down three models and proposes a collaborative path.
May 6, 2025
by Rogerio Santos
· 2,817 Views · 2 Likes
article thumbnail
Unlocking the Potential of Apache Iceberg: A Comprehensive Analysis
Organization adoption perspective and key considerations of Apache Iceberg, a high-performance open-source format for large analytic tables.
May 6, 2025
by Ram Ghadiyaram
· 4,245 Views · 6 Likes
article thumbnail
Hybrid Cloud vs Multi-Cloud: Choosing the Right Strategy for AI Scalability and Security
As AI adoption accelerates, enterprises must choose the right cloud strategy to ensure scalability, security, and performance.
May 6, 2025
by Vaibhav Tupe
· 3,995 Views
article thumbnail
Issue and Present Verifiable Credentials With Spring Boot and Android
Explore how SD-JWTs, OIDC4VCI, and OIDC4VP enable user-consented, selective disclosure of Verifiable Credentials using open standards in a demo setup.
May 5, 2025
by Kyriakos Mandalas DZone Core CORE
· 3,232 Views · 2 Likes
article thumbnail
Unlocking the Benefits of a Private API in AWS API Gateway
Unlock new opportunities with Private APIs while staying vigilant against data exposure and unauthorized access. Learn how to secure your services effectively today.
May 5, 2025
by Satrajit Basu DZone Core CORE
· 4,430 Views · 2 Likes
article thumbnail
While Performing Dependency Selection, I Avoid the Loss Of Sleep From Node.js Libraries' Dangers
From cryptominers hidden in dependencies to protestware freezing builds, one rogue post-install script can jeopardize SLAs, security, and user trust.
May 5, 2025
by Hayk Ghukasyan
· 3,106 Views
article thumbnail
Optimize Deployment Pipelines for Speed, Security and Seamless Automation
Automated deployment strategies boost speed, security, and reliability, ensuring faster, risk-free releases with zero downtime.
May 2, 2025
by Bal Reddy Cherlapally
· 3,457 Views · 1 Like
article thumbnail
Zero Trust for AWS NLBs: Why It Matters and How to Do It
Implementing Zero Trust with NLB helps create robust security for your network while preserving the performance benefits of network load balancing (NLB).
May 1, 2025
by Sathish Holla
· 4,347 Views · 2 Likes
article thumbnail
Integrating Security as Code: A Necessity for DevSecOps
DevSecOps is now growing more than ever. Let's discuss how integrating Security as Code can affect your organization. Check out the benefits along with best practices!
May 1, 2025
by Milosz Jesis
· 3,838 Views · 2 Likes
article thumbnail
GDPR Compliance With .NET: Securing Data the Right Way
GDPR compliance doesn’t have to slow down your app. ASP.NET Core helps you build secure and high-performing applications that meet regulatory standards.
May 1, 2025
by Humna Ghufran
· 3,222 Views · 1 Like
article thumbnail
The Transformative Power of Artificial Intelligence in Cloud Security
Explore the evolving role of AI in cloud security, the benefits it brings, and the challenges it helps organizations overcome.
April 29, 2025
by Shaik Abdul Kareem
· 12,955 Views · 2 Likes
article thumbnail
Why I Started Using Dependency Injection in Python
Learn how Dependency Injection (DI) in Python helps improve code structure, testing, and flexibility, using real-world examples and the dependency-injector library.
April 28, 2025
by Haymang Ahuja
· 2,911 Views · 1 Like
article thumbnail
*You* Can Shape Trend Reports: Join DZone's Software Supply Chain Security Research
Help shape our latest research! Share your insights on SBOMs, zero trust, and the evolving role of AI in software supply chain security.
Updated April 23, 2025
by Lauren Forbes
· 54,302 Views · 28 Likes
article thumbnail
Software Bill of Materials (SBOM): Enhancing Software Transparency and Security
Explore key concepts of SBOMs and how they are an essential tool in modern software development and cybersecurity frameworks.
April 22, 2025
by Vishal Raina
· 3,505 Views · 1 Like
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: