DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

The Latest Security Topics

article thumbnail
How Can Enterprises, ML Developers, and Data Scientists Safely Implement AI to Fight Email Phishing?
These techniques identify phishing emails in real time, allowing organizations to protect themselves from cyber-attacks.
March 29, 2023
by Yash Mehta
· 3,715 Views · 2 Likes
article thumbnail
Data Encryption: Benefits, Types, and Methods
This post explains data encryption and lists its benefits, types and the common encryption methods found in different tools.
April 20, 2023
by Alex Tray
· 4,484 Views · 1 Like
article thumbnail
Web3 Onboarding Is Terrible: How To Make It Better With Account Abstraction and Flow
If you’re working on a web3 app, you know that onboarding users into web3 is difficult. Let's look at how Account Abstraction and Flow have created a better way.
April 20, 2023
by Michael Bogan CORE
· 5,142 Views · 3 Likes
article thumbnail
Diving Into Cloud Infrastructure: An Exploration of Its Different Components
In this blog, we’ll explore the building blocks of cloud infrastructure, including virtualization, containers, microservices, and serverless computing.
April 19, 2023
by Ruchita Varma
· 3,143 Views · 1 Like
article thumbnail
Tornado vs. FastAPI: Why We Made the Switch
This article will discuss the key differences between Tornado and FastAPI, two popular web frameworks for Python.
April 19, 2023
by Andrei Tetka
· 3,529 Views · 2 Likes
article thumbnail
Learn To Become a Web3 Developer by Exploring the Web3 Stack
In this article, I want to explore the web3 developer stack and how you can use it as a starting point to become a web3 developer.
April 18, 2023
by Michael Bogan CORE
· 3,506 Views · 5 Likes
article thumbnail
Breaking the Wall Between Dev, Sec, and Ops
The steps that serve as a roadmap to enable organizations to successfully implement DevSecOps and create secure software right from the outset.
April 18, 2023
by Akanksha Gupta
· 4,263 Views · 2 Likes
article thumbnail
OpenShift vs. Kubernetes: The Unfair Battle
In this article, we are going to be comparing OpenShift and Kubernetes, and let me tell you, the comparison is far from fair.
April 18, 2023
by Rahul Shivalkar
· 5,166 Views · 2 Likes
article thumbnail
Demystifying Data Fabric Architecture: A Comprehensive Overview
This article will provide a comprehensive overview of the data fabric architecture, its key components, and how it works.
April 18, 2023
by Amlan Patnaik
· 4,224 Views · 1 Like
article thumbnail
From Zero to Hero: Learning Web3 With Infura and Python
Starting out with web3 development can be daunting, but using Python and the Infura API can take the edge off.
April 17, 2023
by Alvin Lee CORE
· 4,381 Views · 4 Likes
article thumbnail
Embedded Systems Security Vulnerabilities and Protection Measures
Some tips and important consideration for embedded devices, which are often connected to the internet and can be vulnerable to various types of cyberattacks.
April 17, 2023
by Sreekanth Yalavarthi
· 4,268 Views · 4 Likes
article thumbnail
Shadow and Zombie APIs: How to Minimize Vulnerabilities
There’s growing discussion on the importance of shifting left to incorporate design-time API security strategy, but how do you minimize the risk?
April 17, 2023
by Gemma Sindall
· 3,172 Views · 1 Like
article thumbnail
Securing MQTT With Username and Password Authentication
This article will explain how authentication works in MQTT, what security risks it solves, and introduce password-based authentication.
April 17, 2023
by Kary Ware
· 4,008 Views · 1 Like
article thumbnail
5 DNS Troubleshooting Tips for Network Teams
DNS is a critical but often ignored component of the networking stack. Monitoring DNS query anomalies can help you detect and correct underlying issues.
April 17, 2023
by Terry Bernstein
· 5,335 Views · 2 Likes
article thumbnail
GitHub Exposed a Private SSH Key: What You Need to Know
Everyone has secrets leakage incidents from time to time, even massive players like GitHub. This is a good reminder we all need to stay vigilant.
April 15, 2023
by Dwayne McDaniel
· 5,016 Views · 2 Likes
article thumbnail
HIPAA Compliance Testing in Software Applications
Healthcare enterprises and associated organizations must conduct rigorous testing to ensure HIPAA compliance because violations can have serious consequences.
April 15, 2023
by Mohit Shah
· 3,780 Views · 2 Likes
article thumbnail
How To Build on Linea: A ZK-rollup on Ethereum
In this tutorial, let's deploy a smart contract on Linea, the new Ethereum L2 ZK-rollup, and learn about fast transactions using zero-knowledge proofs.
April 14, 2023
by Michael Bogan CORE
· 3,575 Views · 3 Likes
article thumbnail
Improve AWS Security and Compliance With CDK-nag?
AWS Cloud Development Kit (AWS CDK) is a powerful tool that allows developers to define cloud infrastructure in code using familiar programming languages.
April 14, 2023
by Jeroen Reijn CORE
· 3,909 Views · 2 Likes
article thumbnail
Data Encryption Is the First Line of Defense Against Identity Theft and Cybercrime
Protect your data and identity from cyber criminals with data encryption, the first line of defense against identity theft and cybercrime. Stay secure online!
April 13, 2023
by Ryan Kh
· 4,512 Views · 1 Like
article thumbnail
Don’t Risk It: Critical Cybersecurity Areas New Managers Must Not Overlook
Organizations can reduce the potential risks associated with company reorganization and provide a seamless transition to the new structure.
April 13, 2023
by Praveen Kumar Mannam
· 3,248 Views · 2 Likes
  • Previous
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: