DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
Building Scalable Real-Time Apps with AstraDB and Vaadin
Register Now

The Latest Security Topics

article thumbnail
Types of Software Bugs
Do you know how many types of bugs exist in software testing? Let's read this blog and get complete knowledge about it.
May 1, 2023
by Gaurang Solanki
· 3,490 Views · 4 Likes
article thumbnail
Protecting Your Server Room: 5 Best Practices for Physical Security
Five security practices for server rooms: control access, monitor the environment, secure hardware, use surveillance, and have a recovery plan.
May 4, 2023
by Michael Chukwube
· 3,089 Views · 2 Likes
article thumbnail
Are Recommender Systems Fair? A Critical Look at the Challenges and Solutions
Explore the concept of fairness in recommender systems, challenges involved in achieving fairness, and proposed approaches to address these challenges.
May 4, 2023
by Yifei Wang
· 3,279 Views · 3 Likes
article thumbnail
Why APIs Will Be This Year’s Most Targeted Service
It’s exceedingly difficult to plan for and protect from threats you’re unaware of. However, here are some critical API threats to look out for.
May 4, 2023
by Stefanie Shank
· 3,528 Views · 1 Like
article thumbnail
Why Backup Jira: Is There Any Risk of Data Loss?
Learn the best arguments on why backing up Jira data is an important aspect of your security strategy and the best way to prevent data loss.
May 4, 2023
by Daria Kulikova
· 2,799 Views · 1 Like
article thumbnail
How to Handle SSL Certificates In Selenium WebDriver?
Learn how to handle SSL certificates in Selenium which will help you understand more about SSL certificates and their importance in production and testing.
May 4, 2023
by Vipul Gupta
· 2,699 Views · 1 Like
article thumbnail
Privacy Risk of ChatGPT for Software Developers
The potential data privacy issues surrounding ChatGPT and explore ways that groups and individuals can protect themselves when using this system.
May 3, 2023
by Fawad Malik
· 3,195 Views · 1 Like
article thumbnail
Top Strategies for Effective Mobile App Testing and Quality Assurance
Improve your mobile app's performance and user experience with Top Strategies for Effective Mobile App Testing and Quality Assurance.
May 3, 2023
by Albert Smith
· 2,689 Views · 2 Likes
article thumbnail
Safeguard Your Code With GitHub Dependabot and IBM Cloud Toolchain
This blog talks about how one can smartly automate reporting vulnerabilities which in turn can help track these vulnerabilities so your code always stays healthy.
May 1, 2023
by Rishi Patel
· 3,303 Views · 4 Likes
article thumbnail
Configuring the Security Plug-In/Custom Security Providers for WebLogic Resource Protection
The below article provides insight into the WebLogic server security framework and configures the security plug-in/custom security for the same.
May 1, 2023
by Kishore Kandepu
· 3,800 Views · 2 Likes
article thumbnail
How To Manage Vulnerabilities in Modern Cloud-Native Applications
The article describes how to secure cloud-native applications to identify, manage, and remediate vulnerabilities across the tech stack and ways of integrating security.
April 28, 2023
by Harshad Ithape
· 6,175 Views · 5 Likes
article thumbnail
Migrating FileNet Into AWS Cloud and Migrating FileNet Security Into AWS Cloud
The reader will learn the basics of migrating FileNet into AWS Cloud with an emphasis on migrating FileNet Security into AWS Cloud.
April 28, 2023
by Ravikiran Kandepu
· 5,447 Views · 2 Likes
article thumbnail
Smart Contracts Step-By-Step: A Beginner’s Guide To Debugging and Deploying Smart Contracts With Infura and Truffle
In this article, we’ll walk you through a step-by-step guide on how Truffle and Infura can be utilized to debug and deploy smart contracts on Ethereum.
April 28, 2023
by Michael Bogan CORE
· 5,616 Views · 5 Likes
article thumbnail
User Data Governance and Processing Using Serverless Streaming
This article delves into the concept of User Data Governance and its implementation using serverless streaming in the digital age.
April 27, 2023
by Maharshi Jha
· 5,474 Views · 4 Likes
article thumbnail
Implementing RBAC in Quarkus
In this comprehensive tutorial, learn how to implement built-in and custom Role-Based Access Control (RBAC) in Quarkus to ensure secure REST API access.
April 27, 2023
by Aashreya Shankar
· 7,463 Views · 6 Likes
article thumbnail
Design Patterns for Microservices: Ambassador, Anti-Corruption Layer, and Backends for Frontends
In this article, you will gain a comprehensive understanding of three design patterns and other commonly used patterns for microservices.
April 27, 2023
by Andrei Rogalenko
· 12,034 Views · 3 Likes
article thumbnail
Cybersecurity: Why It’s More Important Than Ever
This article covers the importance of cybersecurity, types of threats, and measures to prevent cyber attacks in today's digital age.
April 27, 2023
by Manas Sadangi CORE
· 3,179 Views · 1 Like
article thumbnail
Benefits of Manual Penetration Testing
While automated pen testing has perks, manual pen testing is still beneficial. Manual pen testers can rely on hard-earned experience, prevent false positives, and more.
April 26, 2023
by Zac Amos
· 2,308 Views · 1 Like
article thumbnail
Thwarting the Theft of Resource Credentials
Using Secured Containerized Development Environments (CDEs) is a great way to protect your DevOps process and implement a robust code dev infra.
February 22, 2023
by Johann Ebener
· 2,125 Views · 2 Likes
article thumbnail
SmartStoreNET: Malicious Message Leading To E-Commerce Takeover
In this article, Sonar's research and development team presents the root cause analysis of two Cross-Site Scripting bugs.
April 25, 2023
by Thomas Chauchefoin
· 1,951 Views · 1 Like
  • Previous
  • ...
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: