DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Security Topics

article thumbnail
Bye Tokens, Hello Patches
Meta's BLT architecture is a better way to scale LLMs that may lead us to replace tokenization with a patches-based approach.
January 15, 2025
by mike labs
· 3,474 Views · 2 Likes
article thumbnail
Advanced Bot Mitigation Using Custom Rate-Limiting Techniques
Custom rate limiting reduces bot traffic, cuts costs by 80%, improves stability by 50%, and enhances detection accuracy by 70% without disrupting user experience.
January 15, 2025
by Mikhail Baranov
· 16,417 Views · 65 Likes
article thumbnail
Data-First IDP: Driving AI Innovation in Developer Platforms
A Data-First IDP integrates governance, traceability, and quality into workflows, transforming how data is managed, enabling scalable, AI-ready ecosystems.
January 15, 2025
by Paul Gale
· 5,885 Views · 2 Likes
article thumbnail
AWS Nitro Enclaves: Enhancing Security With Isolated Compute Environments
AWS Nitro Enclaves are perfect for processing sensitive information and meeting compliance requirements while maintaining operational efficiency.
January 14, 2025
by Sajith Narayanan
· 12,719 Views · 1 Like
article thumbnail
Buildpacks: An Open-Source Alternative to Chainguard
As the industry's need for secure container images is jumping, an OSS Docker alternative provides a solid foundation to solve that issue.
January 13, 2025
by Sylvain Kalache
· 8,728 Views · 3 Likes
article thumbnail
Security in the Age of AI: Challenges and Best Practices
Key security challenges in AI and strategies to protect systems, from data breaches to adversarial attacks, to ensure robust and secure AI integration.
January 13, 2025
by Akanksha Pathak DZone Core CORE
· 3,113 Views · 3 Likes
article thumbnail
A Hands-On Guide to Enable Amazon GuardDuty on AWS Account
This hands-on guide will help you enable Amazon GuardDuty via the AWS Console in order to monitor and detect security threats in your AWS environment.
January 9, 2025
by Sai Sandeep Ogety DZone Core CORE
· 4,093 Views · 13 Likes
article thumbnail
AI Governance: Building Ethical and Transparent Systems for the Future
This article takes a deep dive into AI governance, including insights surrounding its challenges, frameworks, standards, and more.
January 9, 2025
by Sukanya Konatam
· 7,241 Views · 2 Likes
article thumbnail
Non-Human Identity Security Strategy for Zero Trust Architecture
Explore NIST-backed guidance on securing non-human Identities, reducing risks, and aligning with zero-trust principles in cloud-native infrastructures.
January 9, 2025
by Dwayne McDaniel
· 4,543 Views · 1 Like
article thumbnail
API and Security: From IT to Cyber
Learn how to protect your APIs beyond the basics. This article explores the risks, but also the solutions, which are not necessarily limited to the API Manager.
January 8, 2025
by Thomas Jardinet DZone Core CORE
· 5,265 Views · 2 Likes
article thumbnail
AWS Cloud Security: Key Components, Common Vulnerabilities, and Best Practices
Organizations can achieve a robust security posture in AWS by understanding key AWS security components, mitigating vulnerabilities, and adhering to best practices.
January 8, 2025
by John Akkarakaran Jose
· 5,966 Views · 3 Likes
article thumbnail
Understanding WebRTC Security Architecture and IoT
Learn more about how WebRTC's triple-layer security architecture protects IoT communications and creates the building blocks of secure device interactions.
January 8, 2025
by Carsten Rhod Gregersen
· 5,847 Views · 1 Like
article thumbnail
Securely Sign and Manage Documents Digitally With DocuSign and Ballerina
Integrate DocuSign with Ballerina, enabling straightforward interaction with DocuSign APIs to send envelopes, manage recipients, and track statuses.
January 8, 2025
by Nuvindu Hewapathirana
· 5,134 Views · 3 Likes
article thumbnail
Enhancing Cloud Cybersecurity for Critical Infrastructure Protection
Cloud computing enhances infrastructure but raises security risks. Developers must secure systems with zero trust, automation, and collaboration.
January 7, 2025
by Pooyan Hamidi
· 2,985 Views · 2 Likes
article thumbnail
On SBOMs, BitBucket, and OWASP Dependency Track
Learn how to send your system's SBOM from BitBucket to Dependency Track for dashboarding of vulnerabilities and onerous license conditions.
January 7, 2025
by Jan-Rudolph Bührmann
· 3,661 Views · 2 Likes
article thumbnail
Data Governance Challenges in the Age of Generative AI
Navigate privacy, security, and compliance challenges for innovation. Effective data governance is now more critical due to recent generative AI developments.
January 7, 2025
by nishchai jayanna manjula
· 5,852 Views · 3 Likes
article thumbnail
Achieving Security and Trust in a Data Fabric: The Role of Zero Trust Architecture
Explore how zero-trust architecture (ZTA) can provide a solid foundation for achieving security and trust in a data fabric.
January 6, 2025
by Julian Durand
· 4,291 Views · 3 Likes
article thumbnail
Emerging Mobile Threats and Defensive Strategies for Developers
The growth of mobile tech drives innovation but also invites risks. Learn about emerging threats to mobile applications with detailed examples and insights.
January 6, 2025
by Vikesh Dudhankar
· 63,081 Views · 2 Likes
article thumbnail
Optimizing GitHub Access Management for Enterprises: Enhancing Security, Scalability, and Continuity with Jenkins GitHub App Authentication and Load Balancing
Jenkins GitHub App authentication with load balancing boosts security, scalability, and reliability, reducing risks in enterprise CI/CD workflows.
January 2, 2025
by Deepti Marrivada
· 5,078 Views · 1 Like
article thumbnail
Software Development Trends to Follow in 2025
In this blog, I will discuss key software development trends for 2025, from AI-powered tools to ethical AI, low-code platforms, and cloud-native advancements.
January 2, 2025
by Fawad Malik
· 7,312 Views · 7 Likes
  • Previous
  • ...
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: