DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Security Topics

article thumbnail
Custom Vulnerability Risk Scores: Prioritizing Threats With Precision
Learn how custom risk scores empower security teams to cut through the noise of vulnerability alerts and enable them to move with agility.
March 27, 2024
by Kiran Sama
· 1,230 Views · 2 Likes
article thumbnail
Types of Data Breaches in Today’s World
It is vital for organizations to be vigilant in carefully selecting the third parties with whom they allow access to sensitive data.
March 27, 2024
by Saurav Bhattacharya
· 2,070 Views · 3 Likes
article thumbnail
Empowering Developers Through Collaborative Vulnerability Management: Insights From VulnCon 2024
CVE and FIRST empower developers to create secure software through collaboration, standardization, and best practices in vulnerability management.
March 26, 2024
by Tom Smith DZone Core CORE
· 1,515 Views · 1 Like
article thumbnail
Cloud Computing Security: Ensuring Data Protection in the Digital Age
Cloud computing security is vital for protecting data, demanding robust measures to protect data stored and transmitted through cloud service.
March 26, 2024
by faboye michael
· 1,950 Views · 1 Like
article thumbnail
Unlocking IoT Security: Transitioning to Zero-Trust Architecture Simplified
Transitioning to a Zero Trust Architecture (ZTA) for IoT security involves eliminating implicit trust and continuously validating every stage of a digital interaction.
March 26, 2024
by Deep Manishkumar Dave
· 1,697 Views · 2 Likes
article thumbnail
Enhancing Secure Software Development With ASOC Platforms
Elevate DevSecOps with AI-powered ASOC platforms for faster, secure software builds. Simplify compliance and enhance security. Explore more in this article.
March 26, 2024
by Alex Vakulov
· 2,928 Views · 2 Likes
article thumbnail
Service Mesh Unleashed: A Riveting Dive Into the Istio Framework
This article presents an in-depth analysis of the service mesh landscape, focusing specifically on Istio, one of the most popular service mesh frameworks.
March 25, 2024
by Pramodkumar Nedumpilli Ramakrishnan
· 3,131 Views · 3 Likes
article thumbnail
Bridging IoT and Cloud: Enhancing Connectivity With Kong's TCPIngress in Kubernetes
Kong's TCPIngress bridges IoT devices with cloud-native applications, offering secure, scalable connectivity. Essential for real-time data processing and analytics.
March 25, 2024
by Rajesh Gheware DZone Core CORE
· 1,131 Views · 1 Like
article thumbnail
Types of Bot Traffic on a Public Internet Website
In this article, we are going to explore the different types of bot traffic that you might encounter on a public internet website and how you might handle them.
March 25, 2024
by Saurav Bhattacharya
· 911 Views · 2 Likes
article thumbnail
Empowering Developers With Scalable, Secure, and Customizable Storage Solutions
StoneFly simplifies data storage with scalable, secure, and customizable solutions. Seamless integration and unbeatable value for developers and businesses.
March 22, 2024
by Tom Smith DZone Core CORE
· 24,993 Views · 1 Like
article thumbnail
Modern Digital Authentication Protocols
The article will explore the basic theory behind the use of digital authentication protocols and simple examples of situations in which they are used.
March 22, 2024
by Divya Marupaka
· 20,896 Views · 5 Likes
article thumbnail
Getting Started With NCache Java Edition (Using Docker)
Learn how to get started with NCache Java Edition using Docker with step-by-step processes involving the creation of a clustered cache server.
March 22, 2024
by Gowtham K
· 39,773 Views · 2 Likes
article thumbnail
Securing Cloud Storage Access: Approach to Limiting Document Access Attempts
Explore how to secure cloud documents and images by limiting access attempts using GUIDs, tokens, and tracking, enhancing security for image rendering.
March 21, 2024
by Amol Gote DZone Core CORE
· 24,224 Views · 4 Likes
article thumbnail
Role-Based Multi-Factor Authentication
Multi-factor authentication is being adopted by more and more organizations these days because putting it in place greatly increases security.
March 21, 2024
by Sriram Panyam
· 19,352 Views · 6 Likes
article thumbnail
The Role of Data Brokers in Software Development: Navigating Ethics and Privacy Concerns
Discover how data brokers impact software development, ethics, and privacy. Gain insights into user behavior and preferences.
March 21, 2024
by Oliver Stone
· 18,143 Views · 1 Like
article thumbnail
Exploring the Comprehensive World of Burp Suite
Burp Suite is one of the tools available for security testing; a flexible and strong platform that helps security experts evaluate web applications' security posture.
March 21, 2024
by Vaishnavi Nayak
· 16,992 Views · 2 Likes
article thumbnail
Remote Work Security Tips for Developers
Best practices for remote work security for developers include creating office setup standards, requiring cybersecurity training, providing immediate support, and more.
March 21, 2024
by Zac Amos
· 17,930 Views · 1 Like
article thumbnail
Securing Cloud Infrastructure: Leveraging Key Management Technologies
This article explores the world of secure key management, the intricacies of KMS and HSM, their benefits, use cases, key considerations, and best practices.
March 20, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 8,820 Views · 3 Likes
article thumbnail
API Governance: Ensuring Control and Compliance in the Era of Digital Transformation
This comprehensive article explores the significance of API governance, its key components, and best practices for implementation.
March 20, 2024
by Lakshmi Sushma Daggubati
· 8,152 Views · 1 Like
article thumbnail
DevSecOps: Bridging the Gap Between Speed and Security
The article covers how DevSecOps merges security with DevOps, focusing on quick, secure software development through automation and ongoing security checks.
March 20, 2024
by Rajesh Gheware DZone Core CORE
· 3,609 Views · 1 Like
  • Previous
  • ...
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: