DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Security Topics

article thumbnail
The Role of Penetration Testing in Strengthening Cyber Defenses
Penetration testing strengthens cyber defenses by simulating attacks, identifying vulnerabilities, and enhancing security measures.
February 28, 2024
by Favour Efeoghene
· 5,494 Views · 3 Likes
article thumbnail
An Approach To Synthetic Transactions With Spring Microservices: Validating Features and Upgrades
Learn how synthetic transactions in fintech help in assuring quality and confidence, validating business functionality post major updates or new features.
February 27, 2024
by Amol Gote DZone Core CORE
· 7,529 Views · 6 Likes
article thumbnail
Critical Infrastructure Protection in the Age of Cyber Threats
Safeguarding critical infrastructure from cyber threats is paramount. Robust defenses and proactive measures are essential for resilience in today's digital landscape.
February 27, 2024
by faboye michael
· 3,888 Views · 1 Like
article thumbnail
Top 5 Common Cybersecurity Attacks MSPs Should Know in 2024
Discover the cybersecurity attacks targeting MSPs in 2024, and learn how incorporating a robust backup solution can be a game-changer in your cyber defense strategy.
February 27, 2024
by Alex Tray
· 2,792 Views · 1 Like
article thumbnail
Explore Salesforce OAuth Authorization Flows and Its Use Cases
Depending on your use case, you can decide which flow to use for a client app to get an access token to access data in Salesforce.
February 27, 2024
by Jaseem Pookandy DZone Core CORE
· 3,162 Views · 1 Like
article thumbnail
AI Against AI: Harnessing Artificial Intelligence To Detect Deepfakes and Vishing
This article looks at the technologies behind these digital deceptions, their societal implications, and the AI-driven techniques designed to detect them.
February 27, 2024
by venkataramaiah gude
· 2,981 Views · 2 Likes
article thumbnail
Fortifying Web Applications: A Guide To Preventing SQL Injection in AWS RDS SQL Server
This article delves into effective strategies and practices for protecting your RDS SQL Server from SQL injection attacks.
February 27, 2024
by Vijay Panwar DZone Core CORE
· 3,587 Views · 2 Likes
article thumbnail
Unveiling the Power of Virtual Private Networks (VPNs)
We will delve into the world of VPNs, exploring their functionality, benefits, potential drawbacks, and how they contribute to a secure and private online experience.
February 27, 2024
by Aditya Bhuyan
· 3,038 Views · 1 Like
article thumbnail
Automating Policy Enforcement in Kubernetes Using OPA: A Step-By-Step Tutorial
Kubernetes policy enforcement with OPA. Master security and compliance in your cloud-native environment with easy-to-follow steps and practical examples.
February 26, 2024
by Rajesh Gheware DZone Core CORE
· 5,362 Views · 1 Like
article thumbnail
Best Practices To Secure Stateless REST Applications
Explore security management in stateless REST applications, including authentication, access control models, and handling security threats.
February 26, 2024
by Gabriel L. Manor
· 6,766 Views · 8 Likes
article thumbnail
Build a Flow Collectibles Portal Using Cadence (Part 2)
With a Collectibles portal on the Flow blockchain and deployed to the testnet we can now focus on creating the frontend using React in the conclusion of this series.
February 26, 2024
by John Vester DZone Core CORE
· 52,825 Views · 1 Like
article thumbnail
The Art of Ethical Hacking: Securing Systems in the Digital Age
Ethical hacking utilizes techniques for positive purposes, safeguarding digital systems from cyber threats by identifying vulnerabilities before malicious hackers.
February 26, 2024
by faboye michael
· 2,426 Views · 1 Like
article thumbnail
Web Application Security: The Ultimate Guide to Coding Best Practices
Explore best practices and core considerations for writing secure code across web applications in this all-encompassing guide.
February 26, 2024
by Igboanugo David Ugochukwu
· 4,081 Views · 4 Likes
article thumbnail
Security Best Practices for Docker Images
In this guide, we will explore security best practices for Docker images to help you create and maintain secure images for your containerized applications.
February 26, 2024
by Aditya Bhuyan
· 3,665 Views · 2 Likes
article thumbnail
Secure Your API With These 16 Practices With Apache APISIX (Part 1)
A couple of months ago, I stumbled upon this list. In this two-post series, I'd like to describe how we can implement each point with Apache APISIX (or not).
February 23, 2024
by Nicolas Fränkel DZone Core CORE
· 5,144 Views · 1 Like
article thumbnail
Enabling Compliance and Security in AI-Driven, Low-Code/No-Code Development
Low-code/no-code development offers a lot of opportunities for companies across sectors, but it can also bring new security risks and compliance concerns.
February 23, 2024
by Ben Kliger
· 5,126 Views · 1 Like
article thumbnail
The Use of Machine Learning in Cybersecurity: Threat Detection and Prevention
Learn how machine learning boosts cybersecurity by detecting and preventing threats effectively. Explore its pivotal role in safeguarding digital systems.
February 23, 2024
by faboye michael
· 5,643 Views · 1 Like
article thumbnail
Tips To Help GitHub Admins Prepare A Company For SOC 2 And ISO 27001 Audits
Source code protection is highly important nowadays, and when your data is well protected according to the best standards, it becomes an absolute must.
February 23, 2024
by Daria Kulikova
· 5,303 Views · 2 Likes
article thumbnail
Exploring the Nexus Between DevSecOps and Cybersecurity
Explore the vital connection between development, security practices, and the evolving landscape of cybersecurity here in this blog!
February 23, 2024
by Ruchita Varma
· 4,407 Views · 1 Like
article thumbnail
Hiding Data in DB2
Fine-grained access control is usually done in the database, but a programmable proxy can sometimes be used as an alternative. Learn more in this article.
February 22, 2024
by Max Tardiveau
· 3,119 Views · 1 Like
  • Previous
  • ...
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: