DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The Latest Security Topics

article thumbnail
Improve Microservices Security by Applying Zero-Trust Principles
Discover how the zero-trust principles can be applied in a microservices environment and what security controls should be implemented on the back end.
December 18, 2022
by Apostolos Giannakidis
· 6,293 Views · 7 Likes
article thumbnail
Get Started On Celo With Infura RPC Endpoints
Learn about the Celo layer-one blockchain network and how to start building on it using Infura RPC endpoints.
December 17, 2022
by Paul McAviney CORE
· 4,919 Views · 2 Likes
article thumbnail
Software Supply Chain Security Checklist
Software security is a critical part of any product. Follow this checklist to discover five keys to keeping software secure from creation to delivery.
December 17, 2022
by Justin Albano CORE
· 3,263 Views · 1 Like
article thumbnail
ELI5: How Does a TPM Work?
A TPM is a special chip that keeps all your secrets safe on your phone or computer. But what is going on in there?
December 16, 2022
by Nick Hodges CORE
· 2,635 Views · 1 Like
article thumbnail
WordPress Core — Unauthenticated Blind SSRF
In this blog post, Sonar's R and D team describes a surprisingly simple vulnerability in WordPress’s implementation of pingbacks.
December 16, 2022
by Thomas Chauchefoin
· 6,027 Views · 2 Likes
article thumbnail
DevSecOps Easter Eggs
Being aware of the blind spots in an organization (and people) can go a long way toward defending against the unknowns. But where to start? Find out here.
December 16, 2022
by Julie Tsai
· 3,159 Views · 4 Likes
article thumbnail
How to Block API Runtime Threats
We all want a safe environment wherever we go, but we have to hope for the best and prepare for the worst (and prepare to be surprised!). It's the same with apps.
December 16, 2022
by Ross Moore
· 3,295 Views · 2 Likes
article thumbnail
Securing Your Containers—Top 3 Challenges
There are several pitfalls while securing containers and containerized ecosystems. Let's discuss the top three challenges in detail so you can manage them.
December 16, 2022
by Komal J Prabhakar
· 4,493 Views · 1 Like
article thumbnail
How To Build a DAO With Truffle
Follow a tutorial to learn how to build a fully functional, on-chain governance decentralized autonomous organization (DAO) with Ganache and the Truffle Suite.
December 16, 2022
by Alvin Lee CORE
· 2,479 Views · 2 Likes
article thumbnail
DZone Community Awards 2022
There were a lot of great writers and articles published on DZone this year and we wanted to recognize some of the best!
December 16, 2022
by Jason Cockerham
· 8,946 Views · 7 Likes
article thumbnail
Cybersecurity Compliance: The Regulations You Need to Follow
Abiding by compliance is the most straightforward way to boost cybersecurity. Regulations include the NIST, CMMC, SOC-2, and more — here's what they all are.
December 16, 2022
by Zac Amos
· 3,129 Views · 1 Like
article thumbnail
Key Characteristics of Web 3.0 Every User Must Know
This article explains some major properties of Web 3.0 in order to determine the associated complexities and intricacies linked with this emerging web version.
December 15, 2022
by Rishabh Sinha
· 2,749 Views · 1 Like
article thumbnail
Why DevSecOps Automation Is Important for Your Business
Let’s dig deep into the concept of DevSecOps automation and understand how you secure your application workflows.
December 15, 2022
by Gilbert Martin
· 2,858 Views · 1 Like
article thumbnail
7 DevOps Security Best Practices for 2022
Let’s delve deep into what DevOps Security is all about, the processes, best practices, and benefits.
December 15, 2022
by Gilbert Martin
· 3,455 Views · 1 Like
article thumbnail
Observability vs Monitoring Use Cases
Brief introduction of observability and monitoring. Examples of observability use cases and monitoring use cases. Role of observability and monitoring in DevOps.
December 15, 2022
by Hiren Dhaduk
· 3,054 Views · 2 Likes
article thumbnail
Three Must-Have Data Center Security Practices
There is no universal cybersecurity solution. Nevertheless, there are a number of broad rules and best practices that can guide data center security initiatives.
December 15, 2022
by Abdul Majid Qureshi
· 2,099 Views · 1 Like
article thumbnail
Penetration Testing: Process, Tools, Importance and Techniques
This article delves deep into penetration testing, its types, importance, advantages, techniques, and some of the standard tools included in a genuine penetration test.
December 15, 2022
by Mario Olomu
· 2,486 Views · 1 Like
article thumbnail
Security Implications of URL Parsing Differentials
In this article, Sonar's R and D team shares details on how differential URL parsing bugs can occur and what URL parser libraries are affected.
December 14, 2022
by Thomas Chauchefoin
· 7,475 Views · 3 Likes
article thumbnail
Securing The New Frontier in Developer Environments: Cloud IDEs
Cloud-based IDEs are the next logical evolution of the local dev environment. This brings lots of advantages but also some new risks to be aware of as a dev.
December 13, 2022
by Dwayne McDaniel
· 1,774 Views · 1 Like
article thumbnail
Securing Developer Tools: Argument Injection in Visual Studio Code
This article demonstrates how a vulnerability in one of the VS Code URL handlers could lead to the execution of arbitrary commands on the victim's host.
December 13, 2022
by Thomas Chauchefoin
· 6,128 Views · 3 Likes
  • Previous
  • ...
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: