DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Security Topics

article thumbnail
A Comprehensive Guide to Protect Data, Models, and Users in the GenAI Era
This article provides practical checklists to help enterprises securely adopt GenAI.
March 27, 2025
by Boris Zaikin DZone Core CORE
· 3,990 Views
article thumbnail
Multi-Tenant .NET Applications With Keycloak Realms
I use Keycloak Realms to isolate tenants. My .NET app switches Authority and ClientId dynamically to handle multiple realms with one codebase.
March 21, 2025
by Mikhail Petrusheuski
· 3,501 Views · 1 Like
article thumbnail
More Efficient Software Development Means More Need for Devs
AI isn't replacing developers but transforming software development by dramatically increasing efficiency. It eliminates "blank page syndrome."
March 21, 2025
by Sam Stenner
· 3,242 Views · 2 Likes
article thumbnail
Patch Management in the Age of IoT: Challenges and Solutions
IoT patch management tackles risks via automation, lightweight patches, and centralized tools, ensuring security despite device variety and resource limits.
March 20, 2025
by andrew vereen
· 3,408 Views · 1 Like
article thumbnail
Tackling Multidomain Integration in Software Development
Integrating blockchain and biotech presents challenges like data compatibility, security, and scalability. This article explores key risks and offers practical solutions.
March 20, 2025
by Alex Vakulov
· 3,984 Views · 2 Likes
article thumbnail
Bringing Security to Digital Product Design
Looking deeper at personas and journeys are two solutions to move left with security in the development of a digital product.
March 18, 2025
by Emerson Hernandez
· 3,965 Views · 3 Likes
article thumbnail
Secure File Transfer as a Critical Component for AI Success
This article intends to highlight the importance of secure file transfer and its role in support of an organization's artificial intelligence (AI) initiatives.
March 18, 2025
by Anil Soni
· 2,004 Views · 2 Likes
article thumbnail
Building Security into the Feature During the Design Phase
Integrate security into the development phase with threat modeling and static analysis to mitigate risks and strengthen application security.
March 17, 2025
by Siri Varma Vegiraju DZone Core CORE
· 8,218 Views
article thumbnail
Top Security Automation Tools for Auto-Remediation
Speed is vital in cybersecurity, and auto-remediation tools help by quickly detecting and mitigating risks, boosting response efficiency.
March 17, 2025
by Anastasios Arampatzis
· 2,270 Views · 2 Likes
article thumbnail
Stop Wasting Time Writing Code for APIs
Martini automates API creation, security, and integrations — eliminating boilerplate and saving developers' time. Build faster, code less.
March 14, 2025
by David Brown DZone Core CORE
· 6,243 Views · 6 Likes
article thumbnail
5 Ways Docker Can Improve Security in Mobile App Development
Docker enhances mobile app security with dependency isolation, consistent environments, secure images, and proactive vulnerability scanning.
March 13, 2025
by Swapnil Patil
· 14,498 Views · 2 Likes
article thumbnail
How to Deploy Karpenter on AWS Kubernetes With kOps
Karpenter is no longer officially supported by kOps. This blog walks you through the step-by-step process of deploying Karpenter on a kOps-managed AWS Kubernetes cluster.
March 11, 2025
by Paul Muller
· 5,024 Views · 3 Likes
article thumbnail
Generative AI Agents: Transforming Supply Chain Management
LLMs are transforming supply chain management through orchestrated specialized agents that enhance forecasting, planning, and decision-making.
March 10, 2025
by Meghana Puvvadi
· 3,180 Views
article thumbnail
Real-Time Fraud Detection Using AI and Machine Learning
Real-time fraud detection using AI and ML techniques like behavioral analytics, device fingerprinting, and risk scoring.
March 10, 2025
by Milavkumar Shah
· 2,647 Views · 1 Like
article thumbnail
How Data Test Engineers Ensure Compliance and Security With Automation
Data test engineers use automation to ensure compliance with regulations like GDPR and CCPA, safeguard sensitive data, and enhance organizational security.
March 7, 2025
by Sandip Gami
· 3,319 Views · 3 Likes
article thumbnail
A Glimpse Into the Future for Developers and Leaders
Advancements in AI, machine learning, automation, and evolving architecture patterns will shape the future of software development.
March 7, 2025
by Sangame Krishnamani
· 4,495 Views · 1 Like
article thumbnail
How Explainable AI Is Building Trust in Everyday Products
Explainable AI builds trust by clarifying AI decisions, enhancing user confidence across industries like e-commerce, healthcare, and entertainment.
March 6, 2025
by Shailesh Chauhan
· 3,223 Views · 3 Likes
article thumbnail
KIAM vs AWS IAM Roles for Service Accounts (IRSA)
IRSA is preferred for scalability, while KIAM is useful in specific cases. Both ensure least-privilege access to AWS resources.
March 5, 2025
by Kuppusamy Vellamadam Palavesam
· 5,083 Views · 2 Likes
article thumbnail
The Critical Role of CISOs in Managing IAM, Including NHIs
NHIs outnumber human users in enterprises, yet many IAM strategies ignore them. Learn why CISOs must own NHI governance to prevent security breaches.
March 4, 2025
by Dwayne McDaniel
· 2,199 Views · 1 Like
article thumbnail
Zero-Trust Infinite Security: Masking's Powerful New Ally
Organizations adopt privacy by design and zero trust, using data masking and strict access controls to protect sensitive data and prevent breaches.
March 3, 2025
by Yash Mehta
· 2,250 Views · 1 Like
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: