DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Security Topics

article thumbnail
*You* Can Shape Trend Reports: Join DZone's Software Supply Chain Security Research
Help shape our latest research! Share your insights on SBOMs, zero trust, and the evolving role of AI in software supply chain security.
Updated April 23, 2025
by Lauren Forbes
· 54,352 Views · 28 Likes
article thumbnail
Software Bill of Materials (SBOM): Enhancing Software Transparency and Security
Explore key concepts of SBOMs and how they are an essential tool in modern software development and cybersecurity frameworks.
April 22, 2025
by Vishal Raina
· 3,530 Views · 1 Like
article thumbnail
Zero Trust Isn't Just for Networks: Applying Zero-Trust Principles to CI/CD Pipelines
Applied zero trust to CI/CD by removing implicit trust, isolating jobs, using short-lived credentials, and enforcing end-to-end verification.
April 18, 2025
by Yugandhar Suthari
· 4,492 Views · 1 Like
article thumbnail
The Hidden Breach: Secrets Leaked Outside the Codebase Pose a Serious Threat
Secrets aren't just in code. Recent reports show major leaks in collaboration tools like Slack, Jira, and Confluence. Here’s what security teams need to know.
April 17, 2025
by Dwayne McDaniel
· 3,876 Views
article thumbnail
Zero Trust Architecture: Revolutionizing Network Security in the Digital Age
Traditional network security models have become obsolete. Enter Zero Trust Architecture, an approach that challenges decades of established cybersecurity thinking.
April 16, 2025
by Igboanugo David Ugochukwu
· 4,489 Views · 2 Likes
article thumbnail
Enhancing Avro With Semantic Metadata Using Logical Types
Avro logical types add semantic meaning to primitive data types, making schemas more expressive. This blog explores their benefits and common use cases.
April 16, 2025
by Gurmeet Saran
· 5,314 Views · 2 Likes
article thumbnail
Securing Parquet Files: Vulnerabilities, Mitigations, and Validation
Parquet files are widely used in big data ecosystems, but vulnerabilities like CVE-2025-30065 highlight the importance of secure handling.
April 15, 2025
by Vamshidhar Morusu
· 4,355 Views · 1 Like
article thumbnail
Jira Restore And Disaster Recovery: Scenarios and Use Cases
Imagine losing all your project management data — would it paralyze your workflow? Most likely. Learn to build a disaster recovery strategy for every scenario.
April 14, 2025
by Daria Kulikova
· 3,480 Views · 1 Like
article thumbnail
Overcoming MFA Test Automation Challenges
Testing MFA flows is challenging due to device dependencies and automation limits. Learn strategies to streamline testing without compromising security and efficiency.
April 14, 2025
by Jonathan Bernales
· 5,370 Views · 1 Like
article thumbnail
Your Ultimate Website QA Checklist
This article outlines a QA checklist to ensure a website functions smoothly and meets user expectations before launch.
April 8, 2025
by Nazneen Ahmad
· 5,816 Views · 4 Likes
article thumbnail
Achieving Zero Trust and Air-Gapped IaC in IBM Cloud With Schematics
IBM Cloud Schematics enables secure, automated, and policy-driven IaC deployments in air-gapped environments by enforcing zero-trust principles.
April 4, 2025
by Josephine Eskaline Joyce DZone Core CORE
· 4,699 Views · 4 Likes
article thumbnail
Understanding ldd: The Linux Dynamic Dependency Explorer
The Linux command ldd is a versatile utility that lists dynamic library dependencies for executables, helping users identify what shared libraries a program needs to run.
April 3, 2025
by Ajinkya K
· 4,882 Views · 3 Likes
article thumbnail
AI Protection: Securing The New Attack Frontier
The world is moving toward AI-first products. In this article, we discuss how to defend against sophisticated attacks that target the underlying models.
April 2, 2025
by Aditya Visweswaran
· 3,553 Views
article thumbnail
Seamless Security Integration Strategies in Software Development
Building secure software is a must, and effectively integrating security in each stage of the SDLC is critical, cost-effective, and frustration-free.
April 2, 2025
by Singaravelu Ambikapathi
· 4,461 Views · 3 Likes
article thumbnail
Why Generative AI Needs Human Oversight to Build Trust
Generative AI is transforming industries, but Trust Calibration and human oversight are key to keeping it accurate, ethical, and reliable.
April 2, 2025
by Richa Taldar
· 4,481 Views · 3 Likes
article thumbnail
Safeguarding Sensitive Data: Content Detection Technologies in DLP
Data breaches cost $4.88M on average — learn in this article how DLP content detection protects sensitive data with the help of AI, RegEx, OCR, and more.
April 1, 2025
by Praveen Kumar Myakala
· 2,594 Views · 2 Likes
article thumbnail
Stop Exposing Secrets! Secure Your APIs in Postman Like a Pro
Don't expose your secrets! Learn how to secure your APIs in Postman with Vault, Secret Scanner, and best practices to keep your data safe.
March 31, 2025
by Gbadebo Bello
· 3,921 Views · 6 Likes
article thumbnail
AWS WAF Classic vs WAFV2: Features and Migration Considerations
AWS WAFV2 is a major upgrade over WAF Classic, offering better scalability, flexibility, and automation. We'll also look at key migration considerations.
March 31, 2025
by Srinivas Chippagiri DZone Core CORE
· 4,653 Views · 2 Likes
article thumbnail
The Role of DevSecOps in Securing Multi-Cloud Architectures
Discover how DevSecOps enhances security in multi-cloud ecosystems, enabling safe implementation and addressing key challenges with effective strategies.
March 31, 2025
by Hrushikesh Deshmukh
· 3,664 Views · 2 Likes
article thumbnail
Ansible Security and Testing Tools for Automation
Essential collection of security and testing tools and framework for your Ansible automation. Reduce the security risk using the tools.
March 28, 2025
by Vidyasagar (Sarath Chandra) Machupalli FBCS DZone Core CORE
· 7,048 Views · 7 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: