DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Integrating PostgreSQL Databases with ANF: Join this workshop to learn how to create a PostgreSQL server using Instaclustr’s managed service

[DZone Research] Observability + Performance: We want to hear your experience and insights. Join us for our annual survey (enter to win $$).

Monitoring and Observability for LLMs: Datadog and Google Cloud discuss how to achieve optimal AI model performance.

Automated Testing: The latest on architecture, TDD, and the benefits of AI and low-code tools.

The Latest Security Topics

article thumbnail
How to Engineer Your Technical Debt Response
Threat engineering provides a proactive, best practice-based approach to breaking down the organizational silos that naturally form around different types of risks.
March 13, 2023
by Jason Bloomberg
· 2,792 Views · 2 Likes
article thumbnail
OWASP Kubernetes Top 10
The OWASP Kubernetes Top 10 puts all possible risks in order of overall commonality or probability.
Updated March 13, 2023
by Nigel Douglas
· 11,352 Views · 8 Likes
article thumbnail
Using Blockchain Tech to Optimize the Supply Chain
Blockchain technology is not just for cryptocurrency. It can also revolutionize the supply chain.
March 13, 2023
by Devin Partida
· 2,084 Views · 1 Like
article thumbnail
Guarding Against Threats: Examining the Strengths and Applications of Modern Security Models
It is crucial to know the different security models, their features, and their suitability for specific situations.
March 13, 2023
by Akanksha Pathak
· 2,255 Views · 2 Likes
article thumbnail
Untold Benefits of Application Modernization
What is application modernization? In this article, readers will get to know the importance of application modernization along with its benefits and needs.
March 10, 2023
by Hiren Dhaduk
· 3,723 Views · 1 Like
article thumbnail
Supply Chain Security: What Is SLSA? Part I
Attacks on software supply chains have evolved into dangerous threats. Let’s discuss the SLSA framework to understand where supply chain security is headed.
March 9, 2023
by Tiexin Guo
· 4,078 Views · 1 Like
article thumbnail
RSA Algorithm: A Trusted Method for Encrypting and Securing Data
This article explains the secure data transmission of RSA algorithms and how public and private keys work.
March 9, 2023
by Crumb Peter
· 4,022 Views · 1 Like
article thumbnail
The Power of Zero-Knowledge Proofs: Exploring the New ConsenSys zkEVM
See how ConsenSys zk-rollups are evolving at a rapid pace and leading the way in helping Ethereum to scale to new levels.
March 9, 2023
by John Vester CORE
· 52,436 Views · 5 Likes
article thumbnail
Authenticate With OpenID Connect and Apache APISIX
We want to avoid being locked into one identity provider. Here, see a demo of how to use OpenID Connect using Google underneath and then switch to Azure.
March 8, 2023
by Nicolas Fränkel CORE
· 4,127 Views · 6 Likes
article thumbnail
Solving the Enduring Pain of Authorization With Aserto’s Co-Founder and CEO, Omri Gazitt
Security requirements such as authorization and access can be a pain. Dev Interrupted interviews Omri for some tips and tricks.
March 8, 2023
by Dan Lines CORE
· 3,503 Views · 3 Likes
article thumbnail
AWS Multi-Account Strategy and Landing Zone
This article provides information on AWS multi-account strategies and the necessary services required for constructing a landing zone with guide visuals.
March 8, 2023
by Rahul Nagpure
· 3,025 Views · 2 Likes
article thumbnail
Dependency Injection and Ways to Inject It Using .NET Core API
In this article, readers will use a tutorial to learn about dependency injections and how to inject them using .NET Core API, including code and visuals.
March 7, 2023
by Jaydeep Patil
· 2,166 Views · 2 Likes
article thumbnail
Secure APIs: Best Practices and Measures
In this article, we will discuss API Security measures and best practices in securing the APIs or web services.
March 7, 2023
by Sunil Kumar Rangineni
· 5,376 Views · 7 Likes
article thumbnail
5 Ways to Secure a Virtual Machine in Cloud Computing
Five critical recommendations to secure a virtual machine in a cloud computing environment.
March 7, 2023
by Alex Tray
· 2,919 Views · 2 Likes
article thumbnail
Product Security (DevSecOps Practices)
In this article, we will discuss product security, why it is needed, DevSecOps best practices, and its benefits.
March 6, 2023
by Sunil Kumar Rangineni
· 2,096 Views · 5 Likes
article thumbnail
Understanding and Resolving a Common Error
In this post, we will explain what causes the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error and provide some tips on how to resolve it.
March 6, 2023
by Eden Allen
· 1,901 Views · 2 Likes
article thumbnail
Building a Certificate Authority (CA) Server for Your Servers and Applications Free of Cost
Learn the steps to install a certificate authority server on Windows Server. Use for your internal servers, applications, and databases, free of cost.
March 4, 2023
by sagar pawar
· 3,510 Views · 1 Like
article thumbnail
How Artificial Intelligence Is Transforming Cybersecurity
Discover how artificial intelligence is revolutionizing cybersecurity and learn about the benefits it provides to businesses and organizations.
March 4, 2023
by Ryan Kh
· 4,309 Views · 2 Likes
article thumbnail
Make Your Security Policy Auditable
In this article, learn how you can leverage OPA and Apache APISIX to move your authentication and authorization logic from the code to the infrastructure.
March 3, 2023
by Nicolas Fränkel CORE
· 4,682 Views · 2 Likes
article thumbnail
Please Pick a Number
It may seem that the issue of ensuring the proper quality of random data doesn’t concern us unless we directly deal with cryptography, but it is not necessarily the case.
March 3, 2023
by Krzysztof Atlasik
· 4,021 Views · 1 Like
  • Previous
  • ...
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: