DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

How does AI transform chaos engineering from an experiment into a critical capability? Learn how to effectively operationalize the chaos.

Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.

Are you a front-end or full-stack developer frustrated by front-end distractions? Learn to move forward with tooling and clear boundaries.

Developer Experience: Demand to support engineering teams has risen, and there is a shift from traditional DevOps to workflow improvements.

The Latest Security Topics

article thumbnail
Why Choose Bug Bounty Programs? (Benefits and Challenges Explained)
Bug Bounty programs can help effectively identify and mitigate vulnerabilities when combined with secure development practices and proper vulnerability management.
June 10, 2024
by Alex Vakulov
· 2,483 Views · 3 Likes
article thumbnail
Analysis of Flubot Malware on Android OS
Explore research that focuses on the possible methods of Flubot malware's signature, behavior, and future strikes.
June 10, 2024
by Priyank Singh
· 3,336 Views · 1 Like
article thumbnail
Embracing Responsible AI: Principles and Practices
This article provides context on embracing responsible AI along with guidelines for developing AI systems that are transparent, responsible, and lasting.
June 7, 2024
by Naga Santhosh Reddy Vootukuri DZone Core CORE
· 3,039 Views · 3 Likes
article thumbnail
Mocking Dependencies and AI Is the Next Frontier in Vue.js Testing
Mocking dependencies in Vue.js tests is crucial for isolating components, and ensures reliable, efficient, and comprehensive testing in controlled environments.
June 6, 2024
by Anton Lucanus DZone Core CORE
· 11,606 Views · 2 Likes
article thumbnail
Dependency Injection
One of the foundational techniques in Java backend development, helping build resilient and scalable applications tailored to modern software demands.
June 5, 2024
by German Urikh
· 7,639 Views · 3 Likes
article thumbnail
Protecting PII Data With JWT
Use JWT tokens for fine-grained access control while avoiding direct inclusion of PII-like account numbers. Use non-PII identifiers and perform server-side lookup.
June 5, 2024
by Abhishek Goswami
· 3,839 Views · 2 Likes
article thumbnail
Security Considerations When Building SaaS
This article briefly talks about the different models of providing tenant isolation and then delves into the security considerations of building a SaaS.
June 4, 2024
by Mayank Singhi
· 2,631 Views · 1 Like
article thumbnail
New Ways for CNAPP to Shift Left and Shield Right: The Technology Trends That Will Allow CNAPP to Address More Extensive Threat Models
Because of the evolving threat landscape and complexity of modern organizations, the evolution of the CNAPP model yields both significant challenges and opportunities.
June 4, 2024
by Laurent Balmelli, PhD
· 3,335 Views · 1 Like
article thumbnail
Enhancing Vehicle Routing Problems With Deep Reinforcement Learning and Metaheuristics
Combining machine learning methods and traditional optimization techniques for logistics and fleet management execution optimizations.
June 3, 2024
by Sumit Mittal
· 3,813 Views · 2 Likes
article thumbnail
Elevating Defense Precision With AI-Powered Threat Triage in Proactive Dynamic Security
This article sheds light on how artificial intelligence and cybersecurity converge to revolutionize threat detection, incident response, and vulnerability management.
May 31, 2024
by Chinelo Okonkwo
· 2,792 Views · 3 Likes
article thumbnail
Strengthening Cloud Environments Through Python and SQL Integration
Improve cloud environment security with SQL, automating resource management and access control, and Python, managing anomaly detection and real-time monitoring.
May 31, 2024
by Rajesh Remala
· 3,835 Views · 5 Likes
article thumbnail
Using Cron Jobs With Encrypted Home Folders and Malware Protection on Linux
This article explores the implications and solutions for running cron jobs in environments with encrypted home directories and malware scanners.
May 28, 2024
by Constantin Kwiatkowski
· 2,864 Views · 2 Likes
article thumbnail
Less Time Learning, More Time Building
Secure cloud adoption no longer requires an investment in proprietary cloud infra knowledge, allowing teams to implement security that aligns with the business.
May 27, 2024
by John Vester DZone Core CORE
· 65,363 Views · 2 Likes
article thumbnail
Securing the OSS Supply Chain: Best Practices and Real-World Examples
OSS empowers tech with cost efficiency and agility but faces supply chain security risks; this article delves into real-world examples and preventive measures.
May 27, 2024
by Suryaprakash nalluri
· 5,484 Views · 3 Likes
article thumbnail
How To Protect Node.js Form Uploads With a Deterministic Threat Detection API
Learn more about the prevalence of custom file upload forms in web applications and a deterministic threat detection solution for Node.js form uploads.
May 24, 2024
by Brian O'Neill DZone Core CORE
· 2,542 Views · 2 Likes
article thumbnail
How To Protect a File Server
To secure a Linux file server, apply a Defense in Depth approach. Always remember that security is a continuous process, not a one-time task.
May 24, 2024
by Akanksha Pathak DZone Core CORE
· 2,272 Views · 3 Likes
article thumbnail
Constructing Secure and Strong Data Access Layers With JPA
Determine how to control JPA features and secure coding practices to build secure data access layers that protect sensitive information in your applications.
May 23, 2024
by Humashankar Vellathur Jaganathan
· 4,012 Views · 3 Likes
article thumbnail
Key Benefits of Integrating Password Managers Into Kubernetes Security
Integrating password managers into Kubernetes centralizes credentials, enhances security, automates rotations, and improves compliance.
May 23, 2024
by Favour Efeoghene
· 1,784 Views · 1 Like
article thumbnail
Fine-Grained Access Control for Stored Procedures
This article presents a flexible approach to securing your stored procedures using a programmable database proxy. Read more!
May 23, 2024
by Max Tardiveau
· 1,141 Views · 1 Like
article thumbnail
Hexagonal Architecture in the Frontend: A Real Case
Discover why hexagonal architecture, decoupling, and dependency injection can be very useful in the front end.
May 22, 2024
by Sergio Carracedo
· 5,603 Views · 3 Likes
  • Previous
  • ...
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: