DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Integrating PostgreSQL Databases with ANF: Join this workshop to learn how to create a PostgreSQL server using Instaclustr’s managed service

Mobile Database Essentials: Assess data needs, storage requirements, and more when leveraging databases for cloud and edge applications.

Monitoring and Observability for LLMs: Datadog and Google Cloud discuss how to achieve optimal AI model performance.

Automated Testing: The latest on architecture, TDD, and the benefits of AI and low-code tools.

The Latest Security Topics

article thumbnail
AWS Multi-Account Strategy and Landing Zone
This article provides information on AWS multi-account strategies and the necessary services required for constructing a landing zone with guide visuals.
March 8, 2023
by Rahul Nagpure
· 2,986 Views · 2 Likes
article thumbnail
Dependency Injection and Ways to Inject It Using .NET Core API
In this article, readers will use a tutorial to learn about dependency injections and how to inject them using .NET Core API, including code and visuals.
March 7, 2023
by Jaydeep Patil
· 2,154 Views · 2 Likes
article thumbnail
Secure APIs: Best Practices and Measures
In this article, we will discuss API Security measures and best practices in securing the APIs or web services.
March 7, 2023
by Sunil Kumar Rangineni
· 5,329 Views · 7 Likes
article thumbnail
5 Ways to Secure a Virtual Machine in Cloud Computing
Five critical recommendations to secure a virtual machine in a cloud computing environment.
March 7, 2023
by Alex Tray
· 2,908 Views · 2 Likes
article thumbnail
Product Security (DevSecOps Practices)
In this article, we will discuss product security, why it is needed, DevSecOps best practices, and its benefits.
March 6, 2023
by Sunil Kumar Rangineni
· 2,077 Views · 5 Likes
article thumbnail
Understanding and Resolving a Common Error
In this post, we will explain what causes the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error and provide some tips on how to resolve it.
March 6, 2023
by Eden Allen
· 1,888 Views · 2 Likes
article thumbnail
Building a Certificate Authority (CA) Server for Your Servers and Applications Free of Cost
Learn the steps to install a certificate authority server on Windows Server. Use for your internal servers, applications, and databases, free of cost.
March 4, 2023
by sagar pawar
· 3,492 Views · 1 Like
article thumbnail
How Artificial Intelligence Is Transforming Cybersecurity
Discover how artificial intelligence is revolutionizing cybersecurity and learn about the benefits it provides to businesses and organizations.
March 4, 2023
by Ryan Kh
· 4,237 Views · 2 Likes
article thumbnail
Make Your Security Policy Auditable
In this article, learn how you can leverage OPA and Apache APISIX to move your authentication and authorization logic from the code to the infrastructure.
March 3, 2023
by Nicolas Fränkel CORE
· 4,669 Views · 2 Likes
article thumbnail
Please Pick a Number
It may seem that the issue of ensuring the proper quality of random data doesn’t concern us unless we directly deal with cryptography, but it is not necessarily the case.
March 3, 2023
by Krzysztof Atlasik
· 4,009 Views · 1 Like
article thumbnail
Readability in the Test: Exploring the JUnitParams
In this video tutorial, learn how to put more elegance in your test code by using JUnitParams. Learn types and how to simplify your tests with these techniques.
March 3, 2023
by Otavio Santana CORE
· 7,063 Views · 4 Likes
article thumbnail
IAM Best Practices
Download this cheat sheet on IAM, Identity and Access Management, and best practices. It will help you make your cloud environments more secure.
March 2, 2023
by Dwayne McDaniel
· 4,344 Views · 1 Like
article thumbnail
Strategy for Combating New Threat Actors and Emerging Cyberattacks and Risks
This article proposes a security strategy that builds upon the well-established Defense-in-Depth concept, complemented by Zero trust.
Updated March 2, 2023
by Pascal Tene
· 4,518 Views · 3 Likes
article thumbnail
CloudNativeSecurityCon 2023: A Unique Community Event Focused On the Future of Open Source and Cloud Native Security
Highlights from CloudNativeSecurityCon 2023, the first-of-its-kind in-person event, grown from the community's conversations on the front lines of open-source security.
March 2, 2023
by Dwayne McDaniel
· 2,741 Views · 2 Likes
article thumbnail
Website Testing: A Detailed Guide
This article takes a deep look into website testing, the structure of web applications, common website testing methods, testing locally hosted websites, etc.
March 2, 2023
by Amrita Angappa
· 3,123 Views · 2 Likes
article thumbnail
15 Best Practices on API Security for Developers
Secure your applications from vulnerabilities with these simple steps for developers—read our guide on 15 best API security practices for reliable protection.
March 2, 2023
by Janki Mehta
· 6,210 Views · 7 Likes
article thumbnail
Zero Trust Distributed Computing With WebAssembly and WasmCloud
How zero trust computing is supported by cloud-native WebAssembly (wasm) at the module, runtime, capability, and cluster levels.
March 1, 2023
by Kevin Hoffman
· 5,185 Views · 2 Likes
article thumbnail
The Impact of AI on Telecoms Fraud Protection Strategies
Telecoms fraud is a prevalent and ever-evolving issue that affects both business and individual customers in the telecommunications industry.
March 1, 2023
by Ayodele Johnson
· 2,106 Views · 2 Likes
article thumbnail
Login Flow With Google Identity Services and Firebase
Most apps have some sort of authentication. For this post, we will see how this flow works using Google’s One Tap sign-in, Firebase, and Amity.
March 1, 2023
by Eliza Camber
· 1,663 Views · 2 Likes
article thumbnail
The Future of Cybersecurity and How Artificial Intelligence Is Changing the Way
Artificial Intelligence is a powerful tool for identifying cyberspace vulnerabilities, threats, and attacks.
March 1, 2023
by Usama Amin
· 2,270 Views · 1 Like
  • Previous
  • ...
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: