DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workkloads.

Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Security Topics

article thumbnail
How To Implement a Patch Management Process
Implementing a patch management process can help address known vulnerabilities. Follow these best practices and implementation steps for good patch management.
March 28, 2024
by Zac Amos
· 2,166 Views · 2 Likes
article thumbnail
Deno Security: Building Trustworthy Applications
Deno's design philosophy prioritizes security, making it an ideal choice for building secure, reliable, and trustworthy applications.
March 28, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 2,970 Views · 4 Likes
article thumbnail
Navigating the Evolving Landscape of Vulnerability Management
VulnCheck leaders share insights on navigating the challenges of vulnerability management at scale through automation, data sharing, and collaboration.
March 27, 2024
by Tom Smith DZone Core CORE
· 1,076 Views · 1 Like
article thumbnail
Custom Vulnerability Risk Scores: Prioritizing Threats With Precision
Learn how custom risk scores empower security teams to cut through the noise of vulnerability alerts and enable them to move with agility.
March 27, 2024
by Kiran Sama
· 1,210 Views · 2 Likes
article thumbnail
Types of Data Breaches in Today’s World
It is vital for organizations to be vigilant in carefully selecting the third parties with whom they allow access to sensitive data.
March 27, 2024
by Saurav Bhattacharya
· 2,054 Views · 3 Likes
article thumbnail
Empowering Developers Through Collaborative Vulnerability Management: Insights From VulnCon 2024
CVE and FIRST empower developers to create secure software through collaboration, standardization, and best practices in vulnerability management.
March 26, 2024
by Tom Smith DZone Core CORE
· 1,499 Views · 1 Like
article thumbnail
Cloud Computing Security: Ensuring Data Protection in the Digital Age
Cloud computing security is vital for protecting data, demanding robust measures to protect data stored and transmitted through cloud service.
March 26, 2024
by faboye michael
· 1,926 Views · 1 Like
article thumbnail
Unlocking IoT Security: Transitioning to Zero-Trust Architecture Simplified
Transitioning to a Zero Trust Architecture (ZTA) for IoT security involves eliminating implicit trust and continuously validating every stage of a digital interaction.
March 26, 2024
by Deep Manishkumar Dave
· 1,677 Views · 2 Likes
article thumbnail
Enhancing Secure Software Development With ASOC Platforms
Elevate DevSecOps with AI-powered ASOC platforms for faster, secure software builds. Simplify compliance and enhance security. Explore more in this article.
March 26, 2024
by Alex Vakulov
· 2,920 Views · 2 Likes
article thumbnail
Service Mesh Unleashed: A Riveting Dive Into the Istio Framework
This article presents an in-depth analysis of the service mesh landscape, focusing specifically on Istio, one of the most popular service mesh frameworks.
March 25, 2024
by Pramodkumar Nedumpilli Ramakrishnan
· 3,108 Views · 3 Likes
article thumbnail
Bridging IoT and Cloud: Enhancing Connectivity With Kong's TCPIngress in Kubernetes
Kong's TCPIngress bridges IoT devices with cloud-native applications, offering secure, scalable connectivity. Essential for real-time data processing and analytics.
March 25, 2024
by Rajesh Gheware DZone Core CORE
· 1,114 Views · 1 Like
article thumbnail
Types of Bot Traffic on a Public Internet Website
In this article, we are going to explore the different types of bot traffic that you might encounter on a public internet website and how you might handle them.
March 25, 2024
by Saurav Bhattacharya
· 890 Views · 2 Likes
article thumbnail
Empowering Developers With Scalable, Secure, and Customizable Storage Solutions
StoneFly simplifies data storage with scalable, secure, and customizable solutions. Seamless integration and unbeatable value for developers and businesses.
March 22, 2024
by Tom Smith DZone Core CORE
· 24,984 Views · 1 Like
article thumbnail
Modern Digital Authentication Protocols
The article will explore the basic theory behind the use of digital authentication protocols and simple examples of situations in which they are used.
March 22, 2024
by Divya Marupaka
· 20,881 Views · 5 Likes
article thumbnail
Getting Started With NCache Java Edition (Using Docker)
Learn how to get started with NCache Java Edition using Docker with step-by-step processes involving the creation of a clustered cache server.
March 22, 2024
by Gowtham K
· 39,746 Views · 2 Likes
article thumbnail
Securing Cloud Storage Access: Approach to Limiting Document Access Attempts
Explore how to secure cloud documents and images by limiting access attempts using GUIDs, tokens, and tracking, enhancing security for image rendering.
March 21, 2024
by Amol Gote DZone Core CORE
· 24,204 Views · 4 Likes
article thumbnail
Role-Based Multi-Factor Authentication
Multi-factor authentication is being adopted by more and more organizations these days because putting it in place greatly increases security.
March 21, 2024
by Sriram Panyam
· 19,272 Views · 6 Likes
article thumbnail
The Role of Data Brokers in Software Development: Navigating Ethics and Privacy Concerns
Discover how data brokers impact software development, ethics, and privacy. Gain insights into user behavior and preferences.
March 21, 2024
by Oliver Stone
· 18,100 Views · 1 Like
article thumbnail
Exploring the Comprehensive World of Burp Suite
Burp Suite is one of the tools available for security testing; a flexible and strong platform that helps security experts evaluate web applications' security posture.
March 21, 2024
by Vaishnavi Nayak
· 16,975 Views · 2 Likes
article thumbnail
Remote Work Security Tips for Developers
Best practices for remote work security for developers include creating office setup standards, requiring cybersecurity training, providing immediate support, and more.
March 21, 2024
by Zac Amos
· 17,907 Views · 1 Like
  • Previous
  • ...
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: