DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

How does AI transform chaos engineering from an experiment into a critical capability? Learn how to effectively operationalize the chaos.

Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.

Are you a front-end or full-stack developer frustrated by front-end distractions? Learn to move forward with tooling and clear boundaries.

Developer Experience: Demand to support engineering teams has risen, and there is a shift from traditional DevOps to workflow improvements.

The Latest Security Topics

article thumbnail
A Hands-On Guide to Enable Amazon GuardDuty on AWS Account
This hands-on guide will help you enable Amazon GuardDuty via the AWS Console in order to monitor and detect security threats in your AWS environment.
January 9, 2025
by Sai Sandeep Ogety DZone Core CORE
· 4,116 Views · 13 Likes
article thumbnail
AI Governance: Building Ethical and Transparent Systems for the Future
This article takes a deep dive into AI governance, including insights surrounding its challenges, frameworks, standards, and more.
January 9, 2025
by Sukanya Konatam
· 7,321 Views · 2 Likes
article thumbnail
Non-Human Identity Security Strategy for Zero Trust Architecture
Explore NIST-backed guidance on securing non-human Identities, reducing risks, and aligning with zero-trust principles in cloud-native infrastructures.
January 9, 2025
by Dwayne McDaniel
· 4,569 Views · 1 Like
article thumbnail
API and Security: From IT to Cyber
Learn how to protect your APIs beyond the basics. This article explores the risks, but also the solutions, which are not necessarily limited to the API Manager.
January 8, 2025
by Thomas Jardinet DZone Core CORE
· 5,314 Views · 2 Likes
article thumbnail
AWS Cloud Security: Key Components, Common Vulnerabilities, and Best Practices
Organizations can achieve a robust security posture in AWS by understanding key AWS security components, mitigating vulnerabilities, and adhering to best practices.
January 8, 2025
by John Akkarakaran Jose
· 6,011 Views · 3 Likes
article thumbnail
Understanding WebRTC Security Architecture and IoT
Learn more about how WebRTC's triple-layer security architecture protects IoT communications and creates the building blocks of secure device interactions.
January 8, 2025
by Carsten Rhod Gregersen
· 5,896 Views · 1 Like
article thumbnail
Securely Sign and Manage Documents Digitally With DocuSign and Ballerina
Integrate DocuSign with Ballerina, enabling straightforward interaction with DocuSign APIs to send envelopes, manage recipients, and track statuses.
January 8, 2025
by Nuvindu Hewapathirana
· 5,166 Views · 3 Likes
article thumbnail
Enhancing Cloud Cybersecurity for Critical Infrastructure Protection
Cloud computing enhances infrastructure but raises security risks. Developers must secure systems with zero trust, automation, and collaboration.
January 7, 2025
by Pooyan Hamidi
· 3,006 Views · 2 Likes
article thumbnail
On SBOMs, BitBucket, and OWASP Dependency Track
Learn how to send your system's SBOM from BitBucket to Dependency Track for dashboarding of vulnerabilities and onerous license conditions.
January 7, 2025
by Jan-Rudolph Bührmann
· 3,719 Views · 2 Likes
article thumbnail
Data Governance Challenges in the Age of Generative AI
Navigate privacy, security, and compliance challenges for innovation. Effective data governance is now more critical due to recent generative AI developments.
January 7, 2025
by nishchai jayanna manjula
· 5,886 Views · 3 Likes
article thumbnail
Achieving Security and Trust in a Data Fabric: The Role of Zero Trust Architecture
Explore how zero-trust architecture (ZTA) can provide a solid foundation for achieving security and trust in a data fabric.
January 6, 2025
by Julian Durand
· 4,331 Views · 3 Likes
article thumbnail
Emerging Mobile Threats and Defensive Strategies for Developers
The growth of mobile tech drives innovation but also invites risks. Learn about emerging threats to mobile applications with detailed examples and insights.
January 6, 2025
by Vikesh Dudhankar
· 63,103 Views · 2 Likes
article thumbnail
Optimizing GitHub Access Management for Enterprises: Enhancing Security, Scalability, and Continuity with Jenkins GitHub App Authentication and Load Balancing
Jenkins GitHub App authentication with load balancing boosts security, scalability, and reliability, reducing risks in enterprise CI/CD workflows.
January 2, 2025
by Deepti Marrivada
· 5,120 Views · 1 Like
article thumbnail
Software Development Trends to Follow in 2025
In this blog, I will discuss key software development trends for 2025, from AI-powered tools to ethical AI, low-code platforms, and cloud-native advancements.
January 2, 2025
by Fawad Malik
· 7,378 Views · 7 Likes
article thumbnail
Logical Reasoning in Network Problems
Online issues can be highly complex, requiring the capture of key information for a clear understanding. Through logical reasoning, the root cause was pinpointed.
January 1, 2025
by Bin Wang
· 6,954 Views · 4 Likes
article thumbnail
Kubernetes Ephemeral Containers: Enhancing Security and Streamlining Troubleshooting in Production Clusters
Ephemeral containers in Kubernetes offer secure, short-lived debugging without disturbing primary workloads, then vanish — reducing risk and overhead.
December 30, 2024
by Sai Sandeep Ogety DZone Core CORE
· 10,282 Views · 13 Likes
article thumbnail
How to Build a YouTube Clone With Svelte.js, Firebase, and Permit.io
Creating a video-sharing app like YouTube is not just about front-end design and data storage; you should have secure control over what users can see and do.
December 25, 2024
by Ekekenta Odionyenfe
· 5,847 Views · 2 Likes
article thumbnail
Strengthening Cloud Security: Privacy-Preserving Techniques for Compliance With Regulations and the NIST Framework
As cloud adoption increases, it becomes essential to secure data while adhering to GDPR, CCPA, and HIPAA regulations through the use of privacy-preserving techniques.
December 25, 2024
by Dorababu Nadella
· 4,803 Views · 1 Like
article thumbnail
Data Privacy and Security: A Developer's Guide to Handling Sensitive Data With DuckDB
Master sensitive data handling with DuckDB in this guide to implementing data privacy techniques such as PII masking (includes practical Python code examples).
December 23, 2024
by Anil Kumar Moka
· 11,916 Views · 1 Like
article thumbnail
The Art of Prompt Engineering in Incident Response
Explore the foundations, benefits, and best practices for mastering prompt engineering in Incident Response.
December 23, 2024
by Dimple Gajra
· 3,570 Views · 2 Likes
  • Previous
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: