DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The Latest Security Topics

article thumbnail
Public Cloud-to-Cloud Repatriation Trend
This article discusses why organizations are moving away from the public cloud, what cloud repatriation is, its implications, and cloud repatriation statistics.
January 24, 2023
by Kiran Jewargi
· 2,980 Views · 1 Like
article thumbnail
Distributed Stateful Edge Platforms
As companies move to compute and apps closer to where the data is being produced, they need to make their platforms easier and more cost-efficient to manage.
January 24, 2023
by Tom Smith CORE
· 4,044 Views · 1 Like
article thumbnail
Mr. Over, the Engineer [Comic]
How will Mr. Over, the Engineer respond to a request? Find out in this latest Daniel Stori comic.
January 24, 2023
by Daniel Stori CORE
· 3,834 Views · 1 Like
article thumbnail
What Is Blockchain Trilemma and How Could It Be Solved?
The blockchain trilemma is the most complicated problem to fix. This piece perfectly explains the blockchain trilemma and how to solve it.
January 24, 2023
by Mary Forest
· 1,320 Views · 1 Like
article thumbnail
Project Hygiene
Here are some practices one might want to adapt to reduce the chance of big headaches for a software project in the future.
January 24, 2023
by Severn Everett
· 2,614 Views · 1 Like
article thumbnail
Internal Components of Apache ZooKeeper and Their Importance
In this article, readers will learn about the internal components of Apache ZooKeeper. The key concept is the zNode, which be acted as files or directories.
January 20, 2023
by Gautam Goswami CORE
· 3,860 Views · 2 Likes
article thumbnail
Why Does DevOps Recommend Shift-Left Testing Principles?
DevOps stresses the importance of shift-left testing principles for various reasons. Read on to learn about them.
January 20, 2023
by Navya Manoj
· 4,611 Views · 1 Like
article thumbnail
Why Every Fintech Company Needs DevOps
DevOps is crucial for fintech companies for its ability to improve performance, compliance, and security.
January 20, 2023
by Devin Partida
· 4,396 Views · 1 Like
article thumbnail
OpenID Connect Flows
Deep dive guide throughout processes of obtaining Access Token in OpenID Connect.
January 19, 2023
by Bartłomiej Żyliński CORE
· 3,539 Views · 3 Likes
article thumbnail
Efficiently Computing Permissions at Scale: Our Engineering Approach
The RBAC feature creates the notion of “Teams,” a perimeter where each member can see and act upon a restricted number of incidents.
January 18, 2023
by Eugene Nelou
· 3,501 Views · 1 Like
article thumbnail
Integration: Data, Security, Challenges, and Best Solutions
Explore the essentials of integration and lays a theoretical foundation for integrating systems using cloud and on-premises.
January 18, 2023
by Hariprasad Kapilavai
· 3,421 Views · 1 Like
article thumbnail
Top 10 Secure Coding Practices Every Developer Should Know
This guide will share the top ten secure coding practices that every developer should know. You'll never have to worry about writing insecure code again!
January 18, 2023
by Tanhaz Kamaly
· 6,891 Views · 1 Like
article thumbnail
Essential Mobile App Security Tips for Coders in 2023: Make Your App Unhackable
Build the profitable and unhackable and secure mobile app this year without worries of hackers with this Mobile App Development and Security Checklist!
January 17, 2023
by Anna Shipman
· 2,324 Views · 1 Like
article thumbnail
Are Your Password Management Practices up to Par?
Passwords are a fact of modern business but often aren't managed well. Here are some tips for creating a business culture conscious of password security.
January 17, 2023
by Zac Amos
· 2,184 Views · 1 Like
article thumbnail
Visual Network Mapping Your K8s Clusters To Assess Performance
Visual network mapping is crucial for effective network management. Caretta and Grafana provide real-time network visualization and monitoring.
January 17, 2023
by Anton Lawrence CORE
· 3,780 Views · 2 Likes
article thumbnail
Better Performance and Security by Monitoring Logs, Metrics, and More
Monitoring is a crucial part of observability. Learn how monitoring can specifically improve security, performance, and reliability in the next part of my series.
January 17, 2023
by John Vester CORE
· 20,246 Views · 4 Likes
article thumbnail
What Is Azure Site Recovery Service?
Implementing a BCDR strategy to ensure that your data is secure and that your apps and workloads are available during scheduled and unforeseen outages.
January 16, 2023
by Sardar Mudassar Ali Khan
· 2,465 Views · 1 Like
article thumbnail
Classifying Severity Levels for Your Organization
This blog helps you understand levels of severity and how they can enhance your incident response process.
January 16, 2023
by Vishal Padghan
· 2,097 Views · 1 Like
article thumbnail
Essential Protocols for Python Developers to Prevent SQL Injection Attacks
Python developers must familiarize themselves with challenges the final application might deal with, including security risks like SQL injection.
January 14, 2023
by Ryan Kh
· 4,176 Views · 1 Like
article thumbnail
What Are BitB Phishing Attacks?
A browser-in-the-browser (BitB) attack involves a replica of a single sign-on (SSO) authentication window popping up. It can be hard to spot, but you can take measures to protect against BitB scams.
January 14, 2023
by Zac Amos
· 3,884 Views · 1 Like
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: