DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Integrating PostgreSQL Databases with ANF: Join this workshop to learn how to create a PostgreSQL server using Instaclustr’s managed service

Mobile Database Essentials: Assess data needs, storage requirements, and more when leveraging databases for cloud and edge applications.

Monitoring and Observability for LLMs: Datadog and Google Cloud discuss how to achieve optimal AI model performance.

Automated Testing: The latest on architecture, TDD, and the benefits of AI and low-code tools.

The Latest Security Topics

article thumbnail
DeveloperWeek 2023: The Enterprise Community Sharing Security Best Practices
Here are some highlights from some of the DeveloperWeek 2023 sessions where industry leaders shared their security know-how.
March 17, 2023
by Dwayne McDaniel
· 3,337 Views · 1 Like
article thumbnail
AWS IP Address Management
Readers will learn about AWS IPAM, its advanced benefits, granular access controls, and how it can help improve security and optimize IP address utilization.
March 16, 2023
by Rahul Nagpure
· 3,086 Views · 1 Like
article thumbnail
Use After Free: An IoT Security Issue Modern Workplaces Encounter Unwittingly
Use After Free is one of the two major memory allocation-related threats affecting C code. It is preventable with the right solutions and security strategies.
March 16, 2023
by Joydeep Bhattacharya CORE
· 2,653 Views · 1 Like
article thumbnail
5 Common Firewall Misconfigurations and How to Address Them
Properly setting up your firewall can reduce the likelihood of data breaches. A few common firewall misconfigurations to watch for are mismatched authentication standards, open policy configurations, non-compliant services, unmonitored log output, and incorrect test systems data.
March 16, 2023
by Zac Amos
· 2,246 Views · 1 Like
article thumbnail
Container Security: Don't Let Your Guard Down
To comprehend the security implications of a containerized environment, it is crucial to understand the fundamental elements of a container deployment network.
March 16, 2023
by Akanksha Pathak
· 6,296 Views · 4 Likes
article thumbnail
How To Use Artificial Intelligence to Ensure Better Security
In this article, readers will learn how companies can leverage Artificial Intelligence (AI) to improve data security (cybersecurity) in these five ways.
March 14, 2023
by Chandra Shekhar
· 2,520 Views · 1 Like
article thumbnail
Don’t Rely Solely on Privileged Access Management (PAM) To Secure Your Accounts
The only way to protect against privileged account access attack is to ensure that only authorized users gain access to privileged accounts.
March 14, 2023
by Guy Eisdorfer
· 1,430 Views · 1 Like
article thumbnail
A Complete Guide on ERR_SSL_PROTOCOL_ERROR
A step-by-step complete guide to fix ERR_SSL_PROTOCOL_ERROR on Chrome. Learn what causes that error and a solution to resolve it within minutes.
March 14, 2023
by Janki Mehta
· 1,349 Views · 2 Likes
article thumbnail
DevSecOps: The Future of Secure Software Development
Prioritizing software security from the very start of the software development process is essential. This is where DevSecOps comes in.
March 14, 2023
by Mike Kelvin
· 1,855 Views · 1 Like
article thumbnail
JWT Authentication and Authorization: A Detailed Introduction
In this article, readers will learn about JWT Tokens, including background info, structure, and client-server scenarios with JWT Token and JWT Refresh Token.
March 13, 2023
by Jaydeep Patil
· 2,299 Views · 1 Like
article thumbnail
How to Engineer Your Technical Debt Response
Threat engineering provides a proactive, best practice-based approach to breaking down the organizational silos that naturally form around different types of risks.
March 13, 2023
by Jason Bloomberg
· 2,777 Views · 2 Likes
article thumbnail
OWASP Kubernetes Top 10
The OWASP Kubernetes Top 10 puts all possible risks in order of overall commonality or probability.
Updated March 13, 2023
by Nigel Douglas
· 11,323 Views · 8 Likes
article thumbnail
Using Blockchain Tech to Optimize the Supply Chain
Blockchain technology is not just for cryptocurrency. It can also revolutionize the supply chain.
March 13, 2023
by Devin Partida
· 2,072 Views · 1 Like
article thumbnail
Guarding Against Threats: Examining the Strengths and Applications of Modern Security Models
It is crucial to know the different security models, their features, and their suitability for specific situations.
March 13, 2023
by Akanksha Pathak
· 2,227 Views · 2 Likes
article thumbnail
Untold Benefits of Application Modernization
What is application modernization? In this article, readers will get to know the importance of application modernization along with its benefits and needs.
March 10, 2023
by Hiren Dhaduk
· 3,711 Views · 1 Like
article thumbnail
Supply Chain Security: What Is SLSA? Part I
Attacks on software supply chains have evolved into dangerous threats. Let’s discuss the SLSA framework to understand where supply chain security is headed.
March 9, 2023
by Tiexin Guo
· 4,061 Views · 1 Like
article thumbnail
RSA Algorithm: A Trusted Method for Encrypting and Securing Data
This article explains the secure data transmission of RSA algorithms and how public and private keys work.
March 9, 2023
by Crumb Peter
· 3,991 Views · 1 Like
article thumbnail
The Power of Zero-Knowledge Proofs: Exploring the New ConsenSys zkEVM
See how ConsenSys zk-rollups are evolving at a rapid pace and leading the way in helping Ethereum to scale to new levels.
March 9, 2023
by John Vester CORE
· 48,973 Views · 5 Likes
article thumbnail
Authenticate With OpenID Connect and Apache APISIX
We want to avoid being locked into one identity provider. Here, see a demo of how to use OpenID Connect using Google underneath and then switch to Azure.
March 8, 2023
by Nicolas Fränkel CORE
· 4,111 Views · 6 Likes
article thumbnail
Solving the Enduring Pain of Authorization With Aserto’s Co-Founder and CEO, Omri Gazitt
Security requirements such as authorization and access can be a pain. Dev Interrupted interviews Omri for some tips and tricks.
March 8, 2023
by Dan Lines CORE
· 3,487 Views · 3 Likes
  • Previous
  • ...
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: