DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Security Topics

article thumbnail
Developing a Multi-Tenancy Application With Spring Security and JWTs
This article guides you through the process of creating a multi-tenancy application following a Software as a Service (SaaS) model, where each client has a dedicated database.
Updated April 4, 2024
by Md Amran Hossain DZone Core CORE
· 66,313 Views · 22 Likes
article thumbnail
Adopting DevSecOps in the Cloud-Native Playground
Security has become the utmost priority in the cloud-native world. Discover some pointers on how to tackle it and win the DevSecOps game.
Updated April 4, 2024
by Pavan Belagatti DZone Core CORE
· 7,896 Views · 15 Likes
article thumbnail
Game Theory in Blockchain: A Developer's Guide With Java Example
Enhance blockchain stability, security, and efficiency with game theory. Shape consensus mechanisms, incentives, and governance in a Java-based PoS simulation.
April 4, 2024
by Arun Pandey DZone Core CORE
· 3,258 Views · 2 Likes
article thumbnail
Unlocking Personal and Professional Growth: Insights From Incident Management
By applying the principles of incident management, developers can grow both personally and professionally, leading to more fulfilling and successful lives.
April 3, 2024
by Pradeep Gopalgowda
· 12,687 Views · 5 Likes
article thumbnail
Checking TLS and SSL Versions of Applications in JavaScript, Python, and Other Programming Languages
How to check the versions of TLS and SSL used in applications developed in various programming languages to ensure the security and integrity of data over networks.
April 3, 2024
by Elias Naduvath Varghese
· 6,023 Views · 2 Likes
article thumbnail
Next-Gen Data Protection: Navigating Data Security Challenges in 2024
Underscores the critical need for advanced security measures, innovative technologies, and comprehensive strategies to combat cyber threats and safeguard digital assets.
April 3, 2024
by Alex Tray
· 1,360 Views · 1 Like
article thumbnail
Rapid Expansion of Generative AI: A Call for Responsible Product Management
Responsible AI product management ensures ethical, safe, and fair AI use, focusing on integrating key principles and safety features.
April 3, 2024
by Chetan Zawar
· 811 Views · 2 Likes
article thumbnail
AI-Powered DDR: Supercharging Your Threat Detection Capabilities
In the relentless battle against cyber threats, time is of the essence. Integrating AI into DDR solutions marks a turning point in the fight against cybercrime.
April 3, 2024
by Anastasios Arampatzis
· 926 Views · 1 Like
article thumbnail
Understanding Firewalls: Your First Line of Cyber Defense
In this article, we'll delve into the significance of firewalls, their types, how they function, and best practices for implementing them effectively.
April 3, 2024
by Aditya Bhuyan
· 3,136 Views · 2 Likes
article thumbnail
Comprehensive Proxy Server Guide: Types, Applications, and Developer Examples
Proxy servers offer improved performance, security, and privacy. Here, learn about proxy server types including forward, reverse, transparent, SOCKS, and more.
April 3, 2024
by Arun Pandey DZone Core CORE
· 8,090 Views · 3 Likes
article thumbnail
Building Resilient Cybersecurity Into Supply Chain Operations: A Technical Approach
Adding cybersecurity measures into each facet of the supply chain safeguards operations and sensitive data, giving a competitive edge in the digital marketplace.
April 3, 2024
by Akanksha Pathak DZone Core CORE
· 3,366 Views · 3 Likes
article thumbnail
Understanding Prompt Injection and Other Risks of Generative AI
By prioritizing security, organizations can enhance trust, resilience, and reliability in their cloud and AI environments.
April 2, 2024
by Vidyasagar (Sarath Chandra) Machupalli FBCS DZone Core CORE
· 6,425 Views · 5 Likes
article thumbnail
DevSecOps: It’s Time To Pay for Your Demand, Not Ingestion
Asking engineers to cut back on logging introduces an unnecessary distraction from a supportability and toil perspective – impacting primary objectives along the way.
April 2, 2024
by John Vester DZone Core CORE
· 51,972 Views · 3 Likes
article thumbnail
XZ Utils Backdoor [Comic]
Backdoor "xz" is patched, but other doors remain open, highlighting the ongoing challenge of securing software.
April 1, 2024
by Daniel Stori DZone Core CORE
· 5,972 Views · 1 Like
article thumbnail
Maximize Kubernetes Security: Automate TLS Certificate Management With Cert-Manager on KIND Clusters
Effortlessly manage TLS certificates in Kubernetes with cert-manager. Enhance security and streamline deployments with automated certificate issuance and renewal.
March 30, 2024
by Rajesh Gheware DZone Core CORE
· 2,442 Views · 1 Like
article thumbnail
Combatting the 3 AM Ransomware Menace
Fostering a culture of cybersecurity awareness is fundamental for maintaining the integrity and availability of critical services.
March 30, 2024
by Fardin Quazi
· 2,442 Views · 4 Likes
article thumbnail
How To Implement OAuth2 Security in Microservices
Learn to implement OAuth2 Security in microservices distributed systems using OAuth2, Oauth2-Client, Spring Cloud, and Netflix components with full examples.
Updated March 29, 2024
by Md Amran Hossain DZone Core CORE
· 94,640 Views · 17 Likes
article thumbnail
How To Run OWASP ZAP Security Tests in Azure DevOps Pipeline
In this article, learn how configuring OWASP ZAP security tests for webpage UI or API helps to identify the security risks.
Updated March 29, 2024
by Ganesh Hegde DZone Core CORE
· 40,886 Views · 2 Likes
article thumbnail
Secure and Scalable CI/CD Pipeline With AWS
Amazon and DevOps go hand-in-hand with a number of tools and processes that enable an efficient CI/CD pipeline.
Updated March 29, 2024
by Chandani Patel Bhagat
· 40,676 Views · 11 Likes
article thumbnail
Building a Fortified Foundation: The Essential Guide to Secure Landing Zones in the Cloud
Explore Secure Landing Zones (SLZ), a foundational architecture in the cloud that provides a secure environment for hosting workloads.
March 29, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 2,271 Views · 5 Likes
  • Previous
  • ...
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: