DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

How does AI transform chaos engineering from an experiment into a critical capability? Learn how to effectively operationalize the chaos.

Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.

Are you a front-end or full-stack developer frustrated by front-end distractions? Learn to move forward with tooling and clear boundaries.

Developer Experience: Demand to support engineering teams has risen, and there is a shift from traditional DevOps to workflow improvements.

The Latest Security Topics

article thumbnail
The Impact of Biometric Authentication on User Privacy and the Role of Blockchain in Preserving Secure Data
Blockchain technology is a novel solution to privacy concerns and risks associated with the storage and maintenance of biometric data.
March 20, 2024
by Saurav Bhattacharya
· 6,001 Views · 2 Likes
article thumbnail
The Future of Incident Response: SOAR's Impact on Cybersecurity Defense
Discover how SOAR is revolutionizing incident response strategies, safeguarding organizations from relentless cyber threats. Stay ahead of the curve.
March 20, 2024
by Chandan Saxena
· 4,727 Views · 1 Like
article thumbnail
Design Principles-Building a Secure Cloud Architecture
To ensure cloud security, adopt key principles like least privilege, fail-safe design, and a zero-trust model for creating a robust and adaptive cloud architecture.
March 19, 2024
by Suhas Jangoan
· 11,186 Views · 3 Likes
article thumbnail
10 Commandments of API-First Development
The article offers ten vital API guidelines, emphasizing design, security, and efficiency for business success.
March 19, 2024
by Vivin Nath
· 7,634 Views · 2 Likes
article thumbnail
The Power of AI: Building a Robust Data Ecosystem for Enterprise Success
The article emphasizes the importance of building a comprehensive data ecosystem for enterprises, covering key principles, critical components, and value drivers for success.
March 19, 2024
by Siddharth Rajagopal
· 9,214 Views · 3 Likes
article thumbnail
Secure Your API With JWT: Kong OpenID Connect
In this article, walk through the issues of session-based authorization and the benefits of stateless tokens, namely JWT.
March 19, 2024
by Adam Zaręba
· 10,830 Views · 4 Likes
article thumbnail
Exploring Zero-Trust Architecture Implementation in Modern Cybersecurity
Zero-trust flips conventional security on its head by shifting from an implicit trust model to one where verification is required every step of the way.
March 19, 2024
by Igboanugo David Ugochukwu
· 8,807 Views · 2 Likes
article thumbnail
Rethinking DevOps in 2024: Adapting to a New Era of Technology
Emerging technologies, evolving methodologies, and changing business needs are redefining what it means to implement DevOps practices effectively.
March 18, 2024
by Ankush Madaan
· 4,833 Views · 1 Like
article thumbnail
Initializing Services in Node.js Application
An in-depth guide on managing service initialization in Node.js applications, illustrated with a refined JWT Service example.
March 18, 2024
by Anton Kalik
· 5,579 Views · 2 Likes
article thumbnail
Understanding the 2024 Cloud Security Landscape
This post stresses the importance of enhanced cloud security, advocating for unified security practices and Zero Trust Architecture to protect against threats.
March 16, 2024
by Rajat Gupta
· 9,029 Views · 8 Likes
article thumbnail
Building a Sustainable Data Ecosystem
Generative AI brings innovation, but it also brings challenges in privacy, fairness, and accountability in data sharing.
March 15, 2024
by Chidumga Izuzu
· 6,206 Views · 6 Likes
article thumbnail
Four Common CI/CD Pipeline Vulnerabilities
The continuous integration/continuous delivery (CI/CD) pipeline can contain numerous vulnerabilities for hackers to exploit. Here's how to address them.
March 14, 2024
by Zac Amos
· 6,665 Views · 1 Like
article thumbnail
Elevate Your Security Posture: Grafana for Real-Time Security Analytics and Alerts
This article provides a detailed walkthrough on setting up Grafana for real-time security monitoring, crafting insightful dashboards, and configuring effective alerts.
March 14, 2024
by Rajesh Gheware DZone Core CORE
· 6,615 Views · 1 Like
article thumbnail
Cohesity Simplifies Data Management and Security for Developers
Simplified data management and security for developers with a converged, AI-powered platform streamlines workflows and unlocks insights.
March 14, 2024
by Tom Smith DZone Core CORE
· 5,219 Views · 1 Like
article thumbnail
7 Essential Practices for Secure API Development
Master API security with our top 7 practices for safe and reliable API development. Ensure robust software with our expert guide.
March 12, 2024
by Boris Bodin
· 2,635 Views · 1 Like
article thumbnail
Navigating the Shift: Mastering Pod Security in Kubernetes
Master the shift to Pod Security Admission (PSA) in Kubernetes 1.25 with our guide, unlocking advanced security for your deployments.
March 12, 2024
by Rajesh Gheware DZone Core CORE
· 4,735 Views · 1 Like
article thumbnail
How Secure Cloud Development Replaces Virtual Desktop Infrastructures
Learn how secure cloud development environments provide a replacement for secure laptops and virtual desktop infrastructures for secure application development.
March 12, 2024
by Laurent Balmelli, PhD
· 4,917 Views · 2 Likes
article thumbnail
OWASP Top 10 Explained: SQL Injection
This post discusses SQL Injection (SQLi), its types, examples of breaches, and prevention methods to protect against this cybersecurity threat.
March 12, 2024
by Pier-Jean MALANDRINO DZone Core CORE
· 11,261 Views · 7 Likes
article thumbnail
When a Data Mesh Doesn’t Make Sense for Your Organization
Data mesh—including data mesh governance—requires the right mix of process, tooling, and internal resources. Find out what it takes to get data mesh-ready.
March 11, 2024
by Lior Gavish
· 3,108 Views · 1 Like
article thumbnail
Beyond the Call: AI and Machine Learning’s Role in Evolving Vishing Cyber Threats
The social engineering tactic of vishing is a growing problem; you must understand it first in order to properly defend yourself.
March 11, 2024
by Luis Maldonado
· 2,598 Views · 1 Like
  • Previous
  • ...
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: