DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Security Topics

article thumbnail
Is RBAC Still Relevant in 2024?
Explore the state of Role-Based Access Control (RBAC), why and how developers should use it, and what are the best practices to implement it in applications.
May 7, 2024
by Gabriel L. Manor
· 1,542 Views · 2 Likes
article thumbnail
The Role of Kubernetes Security in the Immediate Future of Computing
As the leading container orchestration tool in the cloud infrastructure today, Kubernetes security must be taken seriously when using container infrastructure.
May 7, 2024
by Joseph Chukwube
· 2,262 Views · 2 Likes
article thumbnail
Magic CAPTCHA: Outperforming Google reCAPTCHA by 2,567 Times
Google reCAPTCHA is fundamentally broken. It downloads 1.7MB of blocking JavaScript, and therefore completely destroys your website.
May 7, 2024
by Thomas Hansen DZone Core CORE
· 2,140 Views · 3 Likes
article thumbnail
Implementing EKS Multi-Tenancy Using Capsule (Part 4)
Take a deep dive into security policy verification use cases by configuring security policy engines like Kyverno or Open Gatekeeper.
May 6, 2024
by Phani Krishna Kollapur Gandla
· 1,722 Views · 2 Likes
article thumbnail
Five Ways To Reveal Your Security Practices
Here are the top five ways to ensure the development of a secure product and make the project safer. Read some valuable tips from the Sigma Software team.
May 6, 2024
by Den Smyrnov
· 2,705 Views · 1 Like
article thumbnail
DevSecOps With Open Source Tools
DevSecOps: Integrating speed and security seamlessly. Conducts static and dynamic checks with each code update. Streamline processes without sacrificing safety.
May 3, 2024
by Yusuf Tezcan
· 1,556 Views · 1 Like
article thumbnail
Microsoft Reveals Phi-3: First in a New Wave of SLMs
Phi-3, Microsoft's innovative small language model, boosts efficiency, affordability, and performance with quicker deployment.
May 3, 2024
by Dileep Kumar Pandiya
· 3,096 Views · 1 Like
article thumbnail
Securing the Generative AI Frontier: Specialized Tools and Frameworks for AI Firewall
In this article, you will learn about specialized tools and frameworks for prompt inspection and protection or AI firewalls.
May 3, 2024
by Vidyasagar (Sarath Chandra) Machupalli FBCS DZone Core CORE
· 3,162 Views · 4 Likes
article thumbnail
Preventing Account Takeover Through Open and Centralized Compromised Credential Index
Account Takeover frauds cause billions of dollars to people and companies. An open security standard could prevent this across software applications.
May 2, 2024
by Chetan Honnenahalli
· 1,540 Views · 2 Likes
article thumbnail
Seccomp, eBPF, and the Importance of Kernel System Call Filtering
Learn about attacks that affect user space security products and how popular technologies such as Seccomp and eBPF can be used in such a way that avoids these issues.
May 2, 2024
by Bill Mulligan
· 4,113 Views · 3 Likes
article thumbnail
Integrating SSPM and DevOps for Maximum Project Security
Enhance project security with SSPM and DevOps integration. Discover the power of combining tools for maximum protection.
May 1, 2024
by Ryan Kh
· 1,027 Views · 1 Like
article thumbnail
Exploring FAPI 2.0: The Latest in API Security Technology
This post explores FAPI standards, which enhance secure data exchange in high-risk sectors, evolving from OAuth 2.0-based FAPI 1.0 to the more secure FAPI 2.0.
May 1, 2024
by Hideki Ikeda
· 2,100 Views · 2 Likes
article thumbnail
How To Detect Living-Off-The-Land (LOTL) Attacks
A living-off-the-land attack occurs when cybercriminals exploit legitimate tools and features to gain access. These tips will help detect LOTL attacks.
May 1, 2024
by Zac Amos
· 1,320 Views · 1 Like
article thumbnail
Implementing RSA From Scratch in Python (Part 2)
In Part 2 of this Python series, explore a discussion about Random Prime Numbers and the Fibonacci Number Calculation when implementing RSA from scratch.
April 29, 2024
by Traven West
· 935 Views · 1 Like
article thumbnail
When APIs Go Wrong: Neglecting Rate Limiting
Authentication is important, though not a complete defense. Rate-limiting policies add an extra line of protection to reduce the impact on compromised APIs.
April 29, 2024
by Hugo Guerrero DZone Core CORE
· 1,497 Views · 1 Like
article thumbnail
Revisiting Observability: A Deep Dive Into the State of Monitoring, Costs, and Data Ownership in Today’s Market
Explore insights into the current challenges in monitoring, highlighting issues with instrumentation, pricing models, and data ownership.
April 26, 2024
by Mike Moore
· 2,314 Views · 3 Likes
article thumbnail
The Case for Choosing Between TCP and UDP for Data Transmission
The article compares TCP and UDP for data transmission, weighing reliability and sequential delivery of packets or fast speed and packet delivery in a stream.
April 26, 2024
by John Ejiofor
· 2,284 Views · 1 Like
article thumbnail
Abusing Kubernetes Resources to the Moon
This article provides a practical guide to enforcing resource constraints and monitoring resource abuse in cloud-native workloads.
April 25, 2024
by Nigel Douglas
· 1,758 Views · 3 Likes
article thumbnail
Is Your Roadmap Prioritizing Memory-Safe Programming Languages?
Cybersecurity agencies around the world put out a plea for developers to use memory-safe programming languages. Is your roadmap ready?
April 24, 2024
by Greg Bulmash
· 1,290 Views · 1 Like
article thumbnail
A Discussion on Managing Vulnerabilities
Breaches are common due to unpatched vulnerabilities. Learn why a strong vulnerability management program is crucial for any security strategy.
April 23, 2024
by Tchule Ribeiro
· 596 Views · 1 Like
  • Previous
  • ...
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: