DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

How does AI transform chaos engineering from an experiment into a critical capability? Learn how to effectively operationalize the chaos.

Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.

Are you a front-end or full-stack developer frustrated by front-end distractions? Learn to move forward with tooling and clear boundaries.

Developer Experience: Demand to support engineering teams has risen, and there is a shift from traditional DevOps to workflow improvements.

The Latest Security Topics

article thumbnail
NFT Wallets Unleashed: A Data Structures and Application Design Journey
Exploring world of NFTs and blockchain while prototyping wallet CLI application with efficient data structures using C# and .NET Core.
January 30, 2024
by Anton Yarkov DZone Core CORE
· 2,596 Views · 1 Like
article thumbnail
Edge Security for IoT: Protecting Data at the Edge
In the world of IoT, edge security is crucial. This article explores the unique security challenges and strategies for safeguarding IoT data and devices at the edge.
January 29, 2024
by Deep Manishkumar Dave
· 2,993 Views · 1 Like
article thumbnail
Data Governance and DevOps
This article talks about data governance processes and its importance and how a DevOps mindset can improve its efficiency.
January 29, 2024
by Yashraj Behera
· 3,711 Views · 1 Like
article thumbnail
Simplifying Access: The Role of Single Sign-On (SSO) in Cloud Computing
In this article, we will explore the vital role of SSO in cloud computing, its benefits, key components, implementation, challenges, and the future of secure access management.
January 28, 2024
by Aditya Bhuyan
· 2,872 Views · 2 Likes
article thumbnail
TPM Chips and the Use of TPM in Virtualization Technology
In this article, we will explore TPM chips, their functions, and how they are utilized in virtualization technology.
January 27, 2024
by Aditya Bhuyan
· 3,634 Views · 2 Likes
article thumbnail
Securing the Digital Frontier
This article delves into data protection, privacy, and the latest trends in technology and security.
January 27, 2024
by Saurav Bhattacharya
· 4,254 Views · 3 Likes
article thumbnail
How To Implement Supply Chain Security in Your Organization
This article seeks to unravel the complexities of supply chain security, presenting a clear and detailed exposition of its significance and vulnerabilities.
January 26, 2024
by Kellyn Gorman DZone Core CORE
· 4,031 Views · 2 Likes
article thumbnail
Container Security: The Art and Science of Safeguarding Cloud-Native Environments
Delve into a spectrum of crucial security patterns and anti-patterns to best navigate the ever-evolving and highly popular realm of containers.
Updated January 26, 2024
by Pratik Prakash DZone Core CORE
· 4,100 Views · 1 Like
article thumbnail
Build an OAuth 2.0 Authorization Server With Spring Boot and Spring Security
Check out this tutorial to learn how to build an OAuth 2.0 authorization server with Spring Boot and Spring Security.
Updated January 26, 2024
by Andrew Hughes
· 155,844 Views · 13 Likes
article thumbnail
API Security: Best Practices and Patterns To Securing APIs
In this article, explore how securing APIs is not a one-time task but a continuous endeavor that requires constant vigilance and adaptation to emerging threats.
January 26, 2024
by Kellyn Gorman DZone Core CORE
· 6,728 Views · 6 Likes
article thumbnail
Authorization Code Grant Flow With Spring Security OAuth 2.0
In this tutorial, learn how to implement a Spring authorization server using Spring Security OAuth2.
Updated January 26, 2024
by Amit Mishra DZone Core CORE
· 36,189 Views · 2 Likes
article thumbnail
Spring Security Authentication
Security is one of the most vital concerns for any organization. In this article, you will learn about authentication and how to integrate them with Spring MVC.
Updated January 26, 2024
by Mohamed Labouardy
· 183,804 Views · 35 Likes
article thumbnail
A Framework for Maintaining Code Security With AI Coding Assistants
Learn more on how implementing the right framework, software developers can select and use AI coding tools without introducing serious security flaws in their software.
January 26, 2024
by Philip Piletic DZone Core CORE
· 5,073 Views · 4 Likes
article thumbnail
Safeguarding Privacy: A Developer's Guide to Detecting and Redacting PII With AI-Based Solutions
Navigating Personally Identifiable Information (PII) protection through AI-powered solutions for effective detection and redaction.
January 25, 2024
by Mahmud Adeleye
· 18,587 Views · 2 Likes
article thumbnail
Securing the Digital Frontline: Advanced Cybersecurity Strategies for Modern Web Development
In today's digital era, where the internet has become an integral part of our lives, the significance of cybersecurity in web development cannot be overstated.
January 25, 2024
by Nilesh Savani
· 3,010 Views · 2 Likes
article thumbnail
Monitoring Dynamic Linker Hijacking With eBPF
The article showcases using eBPF for detecting Dynamic Linker Hijacking in Linux by monitoring changes to the /etc/ld.so.preload file.
January 25, 2024
by Efim Rovaev
· 8,353 Views · 2 Likes
article thumbnail
Repository and Metadata Backup, Disaster Recovery, And Compliance: The Unbreakable Trio
Read the article and learn why Compliance, DevOps backup, and Disaster Recovery go together and how this trio can help you ensure the fortress of your digital assets.
January 25, 2024
by Daria Kulikova
· 2,381 Views · 2 Likes
article thumbnail
Comprehensive Gun Detection for Schools: An AI-Based Approach Leveraging Audio and Video Insights
The focus is on identifying guns visually and discerning gun-related sounds, creating a comprehensive system for threat detection.
January 25, 2024
by shiva kumar sriramulugari
· 5,563 Views · 2 Likes
article thumbnail
Building Secure Cloud Applications: A Developer’s Companion to NIST CSF
A developer's guide to building a secure cloud environment with the NIST Cybersecurity Framework.
January 23, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 2,816 Views · 2 Likes
article thumbnail
Unraveling the Wonders of Bluetooth: Connecting the World Wirelessly
This expanded article dives deeper into Bluetooth's various applications, security aspects, its role in healthcare and industry, and its promising future.
January 22, 2024
by Aditya Bhuyan
· 2,363 Views · 2 Likes
  • Previous
  • ...
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: