DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Security Topics

article thumbnail
STRIDE: A Guide to Threat Modeling and Secure Implementation
Cloud monitoring is a gold mine for attackers. This guide breaks down STRIDE threat modeling for cloud data ingestion, processing, and storage.
February 27, 2025
by Aditya Gupta
· 3,744 Views · 5 Likes
article thumbnail
Networking in DevOps: Your Beginner Guide
In this article, we'll cover some of the basics of DevOps networking: why it is so crucial and how you can use it to smooth out your processes.
February 27, 2025
by Rocky Sah
· 4,683 Views · 4 Likes
article thumbnail
Identity and Access Management Solution to Safeguard LLMs
One of the essential security measures to address LLM security involves securing access to the LLMs so that only authorized individuals can access data.
February 26, 2025
by Anant Wairagade
· 4,089 Views · 6 Likes
article thumbnail
A Platform-Agnostic Approach in Cloud Security
Learn a platform-agnostic approach to cloud security, focusing on encryption, zero-trust models, and tools to enhance security across multi-cloud environments.
February 26, 2025
by Natapong Sornprom
· 3,379 Views · 2 Likes
article thumbnail
PostgreSQL 12 End of Life: What to Know and How to Prepare
It covers Amazon RDS Extended Support, upgrade options, and the benefits of migrating to PostgreSQL 16, emphasizing the importance of timely upgrades.
February 26, 2025
by Vivek Singh
· 4,107 Views · 1 Like
article thumbnail
AI-Powered Ransomware Attacks
This article examines AI's impact on cybersecurity and its role in boosting security measures and ransomware threats with multi-layered defense strategies.
February 26, 2025
by Anirudh Khanna
· 3,869 Views · 2 Likes
article thumbnail
Non-Human Identity Security in the Age of AI
The rise of AI in enterprises has expanded the attack surface. Learn how you can secure non-human identities and prevent unauthorized access.
February 25, 2025
by Dwayne McDaniel
· 3,226 Views · 3 Likes
article thumbnail
Protecting Critical Infrastructure From Ransomware
The article emphasizes enhancing critical infrastructure resilience against ransomware through comprehensive cybersecurity measures and collaborative strategies.
February 25, 2025
by Anirudh Khanna
· 3,178 Views · 2 Likes
article thumbnail
The Hidden Cost of Dirty Data in AI Development
Dirty data weakens AI, increases costs, introduces bias, and causes compliance risks. Strong data governance ensures reliable AI outcomes.
February 25, 2025
by Ilya Dudkin DZone Core CORE
· 2,962 Views · 2 Likes
article thumbnail
Integrating AI Agent Workflows in the SOC
As our reliance on AI-enabled hyper-automation increases, we will leverage human expertise to design robust workflows capable of managing repetitive tasks.
February 25, 2025
by Keyur Rajyaguru
· 3,189 Views
article thumbnail
Controlling Access to Google BigQuery Data
Secure your BigQuery data with IAM roles, authorized views, authorized datasets, authorized routines, and authorized materialized views.
February 21, 2025
by Karteek Kotamsetty
· 14,198 Views · 1 Like
article thumbnail
Kata Containers: From Kubernetes Pods to Secure VMs
Kata containers bridge the gap between Kubernetes pods and secure VMs, offering enhanced isolation without sacrificing performance.
February 20, 2025
by Anilkumar Mallakkanavar
· 6,050 Views · 1 Like
article thumbnail
Data Privacy and Governance in Real-Time Data Streaming
Real-time data streaming delivers fast insights but raises privacy and compliance risks. Use encryption, tokenization, and policy enforcement for secure streaming.
February 18, 2025
by Murugan Lakshmanan
· 2,473 Views · 1 Like
article thumbnail
Enhancing Security in JavaScript
Learn techniques for safeguards like input validation, output encoding, Content Security Policies (CSP), and secure coding practices.
February 13, 2025
by Aishwarya Murali
· 4,105 Views
article thumbnail
Cloud Security Is a Data Problem
As cloud data evolves, we need to learn how data integration, AI, and machine learning help mitigate risks in complex cloud environments and prevent breaches.
February 12, 2025
by Ryan Henrich
· 3,687 Views · 1 Like
article thumbnail
USA PATRIOT Act vs SecNumCloud: Which Model for the Future?
The USA PATRIOT Act grants U.S. data access abroad, while French SecNumCloud secures European sovereignty. The challenge: balancing security and sovereignty.
February 12, 2025
by Frederic Jacquet DZone Core CORE
· 3,540 Views · 1 Like
article thumbnail
Top 5 GRC Certifications for Cybersecurity Professionals
GRC Certs will help maximize your real value as a security professional. Learn about the top five GRC certifications to enjoy exponential professional success.
February 11, 2025
by Mayank Singhi
· 5,798 Views · 2 Likes
article thumbnail
Secrets Security Is the Most Important Issue For Mobile Apps
The latest OWASP Top 10 For Mobile list ranks credential mismanagement as the largest concern our applications face. Let's stop letting our secrets sprawl.
February 11, 2025
by Dwayne McDaniel
· 2,686 Views · 1 Like
article thumbnail
Securing Kubernetes in Production With Wiz
Wiz simplifies Kubernetes security in production with real-time threat detection, compliance automation, and robust protection for cloud-native environments.
February 10, 2025
by Sai Sandeep Ogety DZone Core CORE
· 4,725 Views · 2 Likes
article thumbnail
Security Controls in the Android Operating System (OS)
In this post, we will learn the different security controls provided by the Android operating system (OS) to protect the applications running on the device.
February 10, 2025
by Sheshananda Reddy Kandula
· 2,066 Views · 2 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: