DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Security Topics

article thumbnail
Multi-Tenant .NET Applications With Keycloak Realms
I use Keycloak Realms to isolate tenants. My .NET app switches Authority and ClientId dynamically to handle multiple realms with one codebase.
March 21, 2025
by Mikhail Petrusheuski
· 3,637 Views · 1 Like
article thumbnail
More Efficient Software Development Means More Need for Devs
AI isn't replacing developers but transforming software development by dramatically increasing efficiency. It eliminates "blank page syndrome."
March 21, 2025
by Sam Stenner
· 3,275 Views · 2 Likes
article thumbnail
Patch Management in the Age of IoT: Challenges and Solutions
IoT patch management tackles risks via automation, lightweight patches, and centralized tools, ensuring security despite device variety and resource limits.
March 20, 2025
by andrew vereen
· 3,833 Views · 1 Like
article thumbnail
Tackling Multidomain Integration in Software Development
Integrating blockchain and biotech presents challenges like data compatibility, security, and scalability. This article explores key risks and offers practical solutions.
March 20, 2025
by Alex Vakulov
· 4,036 Views · 2 Likes
article thumbnail
Bringing Security to Digital Product Design
Looking deeper at personas and journeys are two solutions to move left with security in the development of a digital product.
March 18, 2025
by Emerson Hernandez
· 4,042 Views · 3 Likes
article thumbnail
Secure File Transfer as a Critical Component for AI Success
This article intends to highlight the importance of secure file transfer and its role in support of an organization's artificial intelligence (AI) initiatives.
March 18, 2025
by Anil Soni
· 2,073 Views · 2 Likes
article thumbnail
Building Security into the Feature During the Design Phase
Integrate security into the development phase with threat modeling and static analysis to mitigate risks and strengthen application security.
March 17, 2025
by Siri Varma Vegiraju DZone Core CORE
· 8,383 Views
article thumbnail
Top Security Automation Tools for Auto-Remediation
Speed is vital in cybersecurity, and auto-remediation tools help by quickly detecting and mitigating risks, boosting response efficiency.
March 17, 2025
by Anastasios Arampatzis
· 2,330 Views · 2 Likes
article thumbnail
Stop Wasting Time Writing Code for APIs
Martini automates API creation, security, and integrations — eliminating boilerplate and saving developers' time. Build faster, code less.
March 14, 2025
by David Brown DZone Core CORE
· 6,326 Views · 6 Likes
article thumbnail
5 Ways Docker Can Improve Security in Mobile App Development
Docker enhances mobile app security with dependency isolation, consistent environments, secure images, and proactive vulnerability scanning.
March 13, 2025
by Swapnil Patil
· 14,548 Views · 2 Likes
article thumbnail
How to Deploy Karpenter on AWS Kubernetes With kOps
Karpenter is no longer officially supported by kOps. This blog walks you through the step-by-step process of deploying Karpenter on a kOps-managed AWS Kubernetes cluster.
March 11, 2025
by Paul Muller
· 5,157 Views · 3 Likes
article thumbnail
Generative AI Agents: Transforming Supply Chain Management
LLMs are transforming supply chain management through orchestrated specialized agents that enhance forecasting, planning, and decision-making.
March 10, 2025
by Meghana Puvvadi
· 3,337 Views
article thumbnail
Real-Time Fraud Detection Using AI and Machine Learning
Real-time fraud detection using AI and ML techniques like behavioral analytics, device fingerprinting, and risk scoring.
March 10, 2025
by Milavkumar Shah
· 2,814 Views · 1 Like
article thumbnail
How Data Test Engineers Ensure Compliance and Security With Automation
Data test engineers use automation to ensure compliance with regulations like GDPR and CCPA, safeguard sensitive data, and enhance organizational security.
March 7, 2025
by Sandip Gami
· 3,618 Views · 3 Likes
article thumbnail
A Glimpse Into the Future for Developers and Leaders
Advancements in AI, machine learning, automation, and evolving architecture patterns will shape the future of software development.
March 7, 2025
by Sangame Krishnamani
· 4,827 Views · 1 Like
article thumbnail
How Explainable AI Is Building Trust in Everyday Products
Explainable AI builds trust by clarifying AI decisions, enhancing user confidence across industries like e-commerce, healthcare, and entertainment.
March 6, 2025
by Shailesh Chauhan
· 3,267 Views · 3 Likes
article thumbnail
KIAM vs AWS IAM Roles for Service Accounts (IRSA)
IRSA is preferred for scalability, while KIAM is useful in specific cases. Both ensure least-privilege access to AWS resources.
March 5, 2025
by Kuppusamy Vellamadam Palavesam
· 5,162 Views · 2 Likes
article thumbnail
The Critical Role of CISOs in Managing IAM, Including NHIs
NHIs outnumber human users in enterprises, yet many IAM strategies ignore them. Learn why CISOs must own NHI governance to prevent security breaches.
March 4, 2025
by Dwayne McDaniel
· 2,226 Views · 1 Like
article thumbnail
Zero-Trust Infinite Security: Masking's Powerful New Ally
Organizations adopt privacy by design and zero trust, using data masking and strict access controls to protect sensitive data and prevent breaches.
March 3, 2025
by Yash Mehta
· 2,422 Views · 1 Like
article thumbnail
Psychological Safety as a Competitive Edge
Learn about psychological safety, the foundation of agile teams that innovate, adapt, and deliver while fostering trust, value creation, and resilience.
February 27, 2025
by Stefan Wolpers DZone Core CORE
· 5,379 Views · 2 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: