DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Security Topics

article thumbnail
A View on Understanding Non-Human Identities Governance
Rethinking the governance, lifecycles, and interdependencies of your machine identities is essential for eliminating secrets sprawl and reducing your attack surface.
February 7, 2025
by Dwayne McDaniel
· 4,065 Views · 5 Likes
article thumbnail
Community Over Code Keynotes Stress Open Source's Vital Role
This year's Community Over Code keynotes highlighted a maturing open-source ecosystem tackling new challenges around security, regulation, and scalability.
February 6, 2025
by Brian Proffitt
· 3,124 Views · 5 Likes
article thumbnail
AI Regulation in the U.S.: Navigating Post-EO 14110
The Trump administration revoked EO 14110, shifting the U.S. toward a market-driven AI strategy to spur innovation and investment.
February 5, 2025
by Frederic Jacquet DZone Core CORE
· 3,884 Views · 4 Likes
article thumbnail
Keycloak and Docker Integration: A Step-by-Step Tutorial
Do you want to configure a Keycloak-Docker integration for your Angular app? Read on to find out how to set everything up.
February 4, 2025
by Michał Zięba
· 7,869 Views · 2 Likes
article thumbnail
Data Governance Essentials: Policies and Procedures (Part 6)
Learn how data quality, policies, and procedures strengthen data governance by ensuring accuracy, compliance, and security for better decision-making.
February 4, 2025
by Sukanya Konatam
· 4,077 Views · 2 Likes
article thumbnail
Processing Cloud Data With DuckDB And AWS S3
DuckDB's ability to read data directly from cloud storage, such as AWS S3, makes it particularly powerful for modern data architectures.
February 4, 2025
by Anil Kumar Moka
· 10,572 Views
article thumbnail
SOC 2 Made Simple: Your Guide to Certification
This guide breaks down the SOC 2 Type 2 certification process into practical steps, from preparation to the audit, with some tips and tools to make the journey smoother.
February 4, 2025
by Roman Misyurin
· 3,343 Views · 3 Likes
article thumbnail
MuleSoft OAuth 2.0 Provider: Password Grant Type
Learn to configure MuleSoft as an OAuth 2.0 provider with the Password Grant type, securing APIs and managing user authentication with best practices.
February 3, 2025
by Nikhil Chawla
· 5,634 Views
article thumbnail
Understanding the Two Schools of Unit Testing
This article provides an overview of Classical school and London school of unit testing in an attempt to understand whether any one of them is better.
January 30, 2025
by Alexander Rumyantsev
· 6,726 Views · 5 Likes
article thumbnail
Secrets Management With Datadog Secret Backend Utility
Learn how to securely manage sensitive data in Datadog using an open-source secret backend utility for seamless integration and enhanced security.
January 30, 2025
by Logan Rohloff
· 3,126 Views · 1 Like
article thumbnail
Why You Don’t Need That New JavaScript Library
Sticking to vanilla JavaScript and proven libraries over flashy new tools leads to more maintainable, secure, and efficient software development.
January 29, 2025
by Denis Ermakov
· 5,054 Views
article thumbnail
Implementing and Testing Cryptographic Primitives With Go
This guide will walk you through the process of implementing and testing various cryptographic primitives using Go’s standard library and best practices.
January 28, 2025
by Sajith Narayanan
· 12,878 Views · 1 Like
article thumbnail
Why Use AWS Lambda Layers? Advantages and Considerations
If you are not using layers for your AWS Lambda function, it's time to reconsider it. This article will give you a glimpse into the implementation of Lambda layers.
January 28, 2025
by Lior Shalom DZone Core CORE
· 4,700 Views · 1 Like
article thumbnail
The Evolution of User Authentication With Generative AI
Modern authentication must evolve beyond CAPTCHAs as advancements in generative AI make traditional verification methods obsolete.
January 27, 2025
by Abhai Pratap Singh
· 4,414 Views · 3 Likes
article thumbnail
Balancing Security and UX With Iterative Experimentation
Experimentation is essential for modern applications as it will allow you to adapt early and improve your product periodically for long-term success.
January 24, 2025
by Swapnil Patil
· 4,090 Views · 2 Likes
article thumbnail
Secure Your Frontend: Practical Tips for Developers
Practical tips to fortify your frontend against common security vulnerabilities, from input sanitization to secure API calls.
January 23, 2025
by Gokul Ramakrishnan
· 2,968 Views · 1 Like
article thumbnail
Multi-Tenant Data Isolation and Row Level Security
Learn how Row Level Security (RLS) enforces data isolation in multi-tenant SaaS systems with a shared database model to improve security and reduce errors.
January 23, 2025
by Rajind Ruparathna
· 6,843 Views
article thumbnail
Streamline npm Packages: Optimize and Boost Performance
Bloated node_modules folders and slow build times stem from unmanaged npm dependencies, leading to inefficiencies and potential risks.
January 22, 2025
by Aishwarya Murali
· 3,690 Views
article thumbnail
Implementing Zero-Trust Security in Kubernetes
Adopting these strategies will enable organizations to enhance their Kubernetes security posture and better defend against evolving cyber threats.
January 22, 2025
by Sai Sandeep Ogety DZone Core CORE
· 6,259 Views · 5 Likes
article thumbnail
ISO 27001 vs SOC 2: Understanding the Differences
ISO 27001 and SOC 2 are frameworks for information security. Choose ISO 27001 (global ISMS certification provider) or SOC 2 (data controls) based on your security needs.
January 16, 2025
by Sam Arsh
· 3,312 Views · 2 Likes
  • Previous
  • ...
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: