DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Security Topics

article thumbnail
Data Governance and DevOps
This article talks about data governance processes and its importance and how a DevOps mindset can improve its efficiency.
January 29, 2024
by Yashraj Behera
· 3,556 Views · 1 Like
article thumbnail
Simplifying Access: The Role of Single Sign-On (SSO) in Cloud Computing
In this article, we will explore the vital role of SSO in cloud computing, its benefits, key components, implementation, challenges, and the future of secure access management.
January 28, 2024
by Aditya Bhuyan
· 2,853 Views · 2 Likes
article thumbnail
TPM Chips and the Use of TPM in Virtualization Technology
In this article, we will explore TPM chips, their functions, and how they are utilized in virtualization technology.
January 27, 2024
by Aditya Bhuyan
· 3,621 Views · 2 Likes
article thumbnail
Securing the Digital Frontier
This article delves into data protection, privacy, and the latest trends in technology and security.
January 27, 2024
by Saurav Bhattacharya
· 4,244 Views · 3 Likes
article thumbnail
How To Implement Supply Chain Security in Your Organization
This article seeks to unravel the complexities of supply chain security, presenting a clear and detailed exposition of its significance and vulnerabilities.
January 26, 2024
by Kellyn Gorman DZone Core CORE
· 3,973 Views · 2 Likes
article thumbnail
Container Security: The Art and Science of Safeguarding Cloud-Native Environments
Delve into a spectrum of crucial security patterns and anti-patterns to best navigate the ever-evolving and highly popular realm of containers.
Updated January 26, 2024
by Pratik Prakash DZone Core CORE
· 4,065 Views · 1 Like
article thumbnail
Build an OAuth 2.0 Authorization Server With Spring Boot and Spring Security
Check out this tutorial to learn how to build an OAuth 2.0 authorization server with Spring Boot and Spring Security.
Updated January 26, 2024
by Andrew Hughes
· 155,533 Views · 13 Likes
article thumbnail
API Security: Best Practices and Patterns To Securing APIs
In this article, explore how securing APIs is not a one-time task but a continuous endeavor that requires constant vigilance and adaptation to emerging threats.
January 26, 2024
by Kellyn Gorman DZone Core CORE
· 6,654 Views · 6 Likes
article thumbnail
Authorization Code Grant Flow With Spring Security OAuth 2.0
In this tutorial, learn how to implement a Spring authorization server using Spring Security OAuth2.
Updated January 26, 2024
by Amit Mishra DZone Core CORE
· 35,962 Views · 2 Likes
article thumbnail
Spring Security Authentication
Security is one of the most vital concerns for any organization. In this article, you will learn about authentication and how to integrate them with Spring MVC.
Updated January 26, 2024
by Mohamed Labouardy
· 183,675 Views · 34 Likes
article thumbnail
A Framework for Maintaining Code Security With AI Coding Assistants
Learn more on how implementing the right framework, software developers can select and use AI coding tools without introducing serious security flaws in their software.
January 26, 2024
by Philip Piletic DZone Core CORE
· 5,046 Views · 4 Likes
article thumbnail
Safeguarding Privacy: A Developer's Guide to Detecting and Redacting PII With AI-Based Solutions
Navigating Personally Identifiable Information (PII) protection through AI-powered solutions for effective detection and redaction.
January 25, 2024
by Mahmud Adeleye
· 18,491 Views · 2 Likes
article thumbnail
Securing the Digital Frontline: Advanced Cybersecurity Strategies for Modern Web Development
In today's digital era, where the internet has become an integral part of our lives, the significance of cybersecurity in web development cannot be overstated.
January 25, 2024
by Nilesh Savani
· 2,981 Views · 2 Likes
article thumbnail
Monitoring Dynamic Linker Hijacking With eBPF
The article showcases using eBPF for detecting Dynamic Linker Hijacking in Linux by monitoring changes to the /etc/ld.so.preload file.
January 25, 2024
by Efim Rovaev
· 8,297 Views · 2 Likes
article thumbnail
Repository and Metadata Backup, Disaster Recovery, And Compliance: The Unbreakable Trio
Read the article and learn why Compliance, DevOps backup, and Disaster Recovery go together and how this trio can help you ensure the fortress of your digital assets.
January 25, 2024
by Daria Kulikova
· 2,369 Views · 2 Likes
article thumbnail
Comprehensive Gun Detection for Schools: An AI-Based Approach Leveraging Audio and Video Insights
The focus is on identifying guns visually and discerning gun-related sounds, creating a comprehensive system for threat detection.
January 25, 2024
by shiva kumar sriramulugari
· 5,552 Views · 2 Likes
article thumbnail
Building Secure Cloud Applications: A Developer’s Companion to NIST CSF
A developer's guide to building a secure cloud environment with the NIST Cybersecurity Framework.
January 23, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 2,760 Views · 2 Likes
article thumbnail
Unraveling the Wonders of Bluetooth: Connecting the World Wirelessly
This expanded article dives deeper into Bluetooth's various applications, security aspects, its role in healthcare and industry, and its promising future.
January 22, 2024
by Aditya Bhuyan
· 2,344 Views · 2 Likes
article thumbnail
Maven Dependency Scope Applied
Learn how to use Maven's dependency scope to adhere to the chosen architecture in a multi-module project.
January 22, 2024
by Maksim Kren
· 4,193 Views · 3 Likes
article thumbnail
Building Decentralized Applications With Node.js and Web 3.0
In the rapidly evolving landscape of web development, Web 3.0 represents a paradigm shift towards a more decentralized, user-empowering internet.
January 22, 2024
by Nilesh Savani
· 10,570 Views · 3 Likes
  • Previous
  • ...
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: