DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Security Topics

article thumbnail
Five Best Data De-Identification Tools To Protect Patient Data and Stay Compliant
With the help of data de-identification software, it has become easier to mask personal data that can put an individual at risk.
January 31, 2024
by Stylianos Kampakis
· 3,855 Views · 2 Likes
article thumbnail
AI for Web Devs: Addressing Bugs, Security, and Reliability
In this post, we'll walk through our existing AI application and address bugs, security, and reliability concerns for most apps and AI apps specifically.
January 31, 2024
by Austin Gil DZone Core CORE
· 4,755 Views · 1 Like
article thumbnail
SIEM Volume Spike Alerts Using ML
This article covers a brief introduction to SIEM, data engineering problems in log collection, and solutions using the ML approach.
January 31, 2024
by Madhusudhan Dasari
· 3,311 Views · 2 Likes
article thumbnail
Pinterest's Transition to HTTP/3: A Boost in Performance and Reliability
Pinterest's adoption of HTTP/3 is a strategic move to enhance the platform's networking performance. It also helps to leverage the protocol's advanced features.
January 31, 2024
by Roopa Kushtagi
· 2,542 Views · 1 Like
article thumbnail
Rethinking Data Governance: Metrics for Meaningful Outcomes
Data governance has been obsessed with a metric that feels more like accounting than strategic decision-making: coverage. The problem? Coverage misses the mark.
January 30, 2024
by Kirit Basu
· 2,528 Views · 2 Likes
article thumbnail
Device and Data Security in Embedded Systems
Securing embedded systems is a major concern with the increase in connected devices. Explore what makes them vulnerable.
January 30, 2024
by Ambuj Nandanwar
· 2,252 Views · 1 Like
article thumbnail
NFT Wallets Unleashed: A Data Structures and Application Design Journey
Exploring world of NFTs and blockchain while prototyping wallet CLI application with efficient data structures using C# and .NET Core.
January 30, 2024
by Anton Yarkov DZone Core CORE
· 2,546 Views · 1 Like
article thumbnail
Edge Security for IoT: Protecting Data at the Edge
In the world of IoT, edge security is crucial. This article explores the unique security challenges and strategies for safeguarding IoT data and devices at the edge.
January 29, 2024
by Deep Manishkumar Dave
· 2,942 Views · 1 Like
article thumbnail
Data Governance and DevOps
This article talks about data governance processes and its importance and how a DevOps mindset can improve its efficiency.
January 29, 2024
by Yashraj Behera
· 3,473 Views · 1 Like
article thumbnail
Simplifying Access: The Role of Single Sign-On (SSO) in Cloud Computing
In this article, we will explore the vital role of SSO in cloud computing, its benefits, key components, implementation, challenges, and the future of secure access management.
January 28, 2024
by Aditya Bhuyan
· 2,839 Views · 2 Likes
article thumbnail
TPM Chips and the Use of TPM in Virtualization Technology
In this article, we will explore TPM chips, their functions, and how they are utilized in virtualization technology.
January 27, 2024
by Aditya Bhuyan
· 3,611 Views · 2 Likes
article thumbnail
Securing the Digital Frontier
This article delves into data protection, privacy, and the latest trends in technology and security.
January 27, 2024
by Saurav Bhattacharya
· 4,223 Views · 3 Likes
article thumbnail
How To Implement Supply Chain Security in Your Organization
This article seeks to unravel the complexities of supply chain security, presenting a clear and detailed exposition of its significance and vulnerabilities.
January 26, 2024
by Kellyn Gorman DZone Core CORE
· 3,924 Views · 2 Likes
article thumbnail
Container Security: The Art and Science of Safeguarding Cloud-Native Environments
Delve into a spectrum of crucial security patterns and anti-patterns to best navigate the ever-evolving and highly popular realm of containers.
Updated January 26, 2024
by Pratik Prakash DZone Core CORE
· 4,034 Views · 1 Like
article thumbnail
Build an OAuth 2.0 Authorization Server With Spring Boot and Spring Security
Check out this tutorial to learn how to build an OAuth 2.0 authorization server with Spring Boot and Spring Security.
Updated January 26, 2024
by Andrew Hughes
· 155,297 Views · 13 Likes
article thumbnail
API Security: Best Practices and Patterns To Securing APIs
In this article, explore how securing APIs is not a one-time task but a continuous endeavor that requires constant vigilance and adaptation to emerging threats.
January 26, 2024
by Kellyn Gorman DZone Core CORE
· 6,585 Views · 6 Likes
article thumbnail
Authorization Code Grant Flow With Spring Security OAuth 2.0
In this tutorial, learn how to implement a Spring authorization server using Spring Security OAuth2.
Updated January 26, 2024
by Amit Mishra DZone Core CORE
· 35,785 Views · 2 Likes
article thumbnail
Spring Security Authentication
Security is one of the most vital concerns for any organization. In this article, you will learn about authentication and how to integrate them with Spring MVC.
Updated January 26, 2024
by Mohamed Labouardy
· 183,551 Views · 34 Likes
article thumbnail
A Framework for Maintaining Code Security With AI Coding Assistants
Learn more on how implementing the right framework, software developers can select and use AI coding tools without introducing serious security flaws in their software.
January 26, 2024
by Philip Piletic DZone Core CORE
· 5,016 Views · 4 Likes
article thumbnail
Safeguarding Privacy: A Developer's Guide to Detecting and Redacting PII With AI-Based Solutions
Navigating Personally Identifiable Information (PII) protection through AI-powered solutions for effective detection and redaction.
January 25, 2024
by Mahmud Adeleye
· 18,411 Views · 2 Likes
  • Previous
  • ...
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: