DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Curious about the future of data-driven systems? Join our Data Engineering roundtable and learn how to build scalable data platforms.

Data Engineering: The industry has come a long way from organizing unstructured data to adopting today's modern data pipelines. See how.

Threat Detection: Learn core practices for managing security risks and vulnerabilities in your organization — don't regret those threats!

Managing API integrations: Assess your use case and needs — plus learn patterns for the design, build, and maintenance of your integrations.

The Latest Security Topics

article thumbnail
Combating Malware Threats
Understanding the diverse array of malware types is crucial for individuals, organizations, and cybersecurity professionals.
February 9, 2024
by Saurav Bhattacharya
· 4,366 Views · 1 Like
article thumbnail
Evolution of Privacy-Preserving AI: From Protocols to Practical Implementations
Let's examine the correlation between AI systems, machine learning, and the utilization of sensitive information.
February 9, 2024
by Petr Emelianov
· 17,785 Views · 36 Likes
article thumbnail
Securing the Keys to the Kingdom: Exploring the Depths of Privileged Access Management (PAM)
Discover how PAM, a key element of Zero Trust architecture, safeguards privileged access to secure sensitive information and prevent unauthorized access.
February 9, 2024
by Nitin Uttreja
· 6,344 Views · 1 Like
article thumbnail
Hardening Apache APISIX With the OWASP's Coraza and Core Ruleset
The OWASP regularly publishes a Top 10 vulnerability report. The report targets vulnerabilities in web applications. Here, learn how to fix some of them.
February 8, 2024
by Nicolas Fränkel DZone Core CORE
· 2,482 Views · 2 Likes
article thumbnail
Best Practices To Create Highly Secure Applications in Mule 4
In this blog, I would like to share a few best practices for creating highly secure applications in Mule 4 for all deployment options.
February 8, 2024
by PRAVEEN SUNDAR
· 3,114 Views · 1 Like
article thumbnail
Good Application Security Posture Requires Good Data
Application Security Posture Management, ASPM, is only as good as the data sources. Learn about the pitfalls and what to look for in tools and scanners.
February 8, 2024
by Dwayne McDaniel
· 2,560 Views · 1 Like
article thumbnail
A Comprehensive Guide To Achieving SOC 2 Compliance
In this blog post, we’ll define SOC 2 compliance and walk you through the various phases and processes you can follow to achieve it.
February 8, 2024
by Nitesh Saini
· 2,594 Views · 1 Like
article thumbnail
Unleashing the Power of WebAssembly to Herald a New Era in Web Development
Embark on a revolutionary journey in web development with our expertise in harnessing the transformative power of WebAssembly.
February 8, 2024
by Harris Anderson
· 9,700 Views · 7 Likes
article thumbnail
Developing Software Applications Under the Guidance of Data-Driven Decision-Making Principles
In this article, the author underscores the vital role of data in the creation of applications that deliver precise outputs aligned with business requirements.
February 7, 2024
by Sumit Sanwal
· 3,132 Views · 1 Like
article thumbnail
Composability in Flow: Unlocking Technical and Business Opportunities
We'll look at what composability is and how you can use it to make your smart contract development process easier and more efficient.
February 7, 2024
by Rami James
· 2,124 Views · 1 Like
article thumbnail
Choosing the Right SMB Backup Solution
Choose a backup solution for your SMB based on scalability, cost, data security, and ease of use. Learn best practices to evaluate backup options.
February 7, 2024
by Alex Tray
· 3,587 Views · 1 Like
article thumbnail
Patch Management and Container Security
This article explores the importance of keeping things secure in container systems, specifically by managing patches and dealing with vulnerabilities.
February 6, 2024
by Ajay Kanse
· 5,715 Views · 1 Like
article thumbnail
Unlocking Seamless Experiences: Embracing Passwordless Login for Effortless Customer Registration and Authentication
Passwordless authentication is rapidly gaining traction and holds unparalleled opportunities to revolutionize both user experience and security.
February 6, 2024
by Deepak Gupta
· 1,747 Views · 1 Like
article thumbnail
The Future of Rollouts: From Big Bang to Smart and Secure Approach to Web Application Deployments
This article proposes a new way of using AWS to roll out updates safely to targeted user groups, reducing risk and improving user experience.
February 6, 2024
by Vinod Kolla
· 2,285 Views · 1 Like
article thumbnail
The Trusted Liquid Workforce
Onboarding software developers securely is a challenge for most global organizations interested in protecting their intellectual property.
February 5, 2024
by Laurent Balmelli, PhD
· 2,239 Views · 2 Likes
article thumbnail
Data Lineage in Modern Data Engineering
Data lineage is a critical aspect of data engineering that often plays a pivotal role in ensuring data quality, traceability, and compliance.
February 5, 2024
by Kshitiz Jain
· 2,446 Views · 1 Like
article thumbnail
The Role of DevOps in Enhancing the Software Development Life Cycle
DevOps is a crucial tool in modern software development services, helping businesses achieve better overall performance.
February 3, 2024
by Stylianos Kampakis
· 4,112 Views · 1 Like
article thumbnail
WebRTC vs. RTSP: Understanding the IoT Video Streaming Protocols
With video surveillance booming, WebRTC and RTSP meet diverse streaming needs in IoT. Let's discuss the basics and benefits of each protocol.
February 3, 2024
by Carsten Rhod Gregersen
· 8,316 Views · 1 Like
article thumbnail
Top 4 Developer Takeaways From the 2024 Kubernetes Benchmark Report
The 2024 Kubernetes Benchmark Report contains some key findings with implications for developers in the areas of cost efficiency, reliability, and security.
February 2, 2024
by Bill Ledingham
· 5,128 Views · 1 Like
article thumbnail
Simplifying Data Management for Technology Teams With HYCU
HYCU and Anthropic launched a pioneering collaboration for generative AI-powered unified data management across on-premise, multi-cloud, and SaaS.
February 2, 2024
by Tom Smith DZone Core CORE
· 4,164 Views · 1 Like
  • Previous
  • ...
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: