DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The Latest Security Topics

article thumbnail
Considerations for Serving and Consuming APIs Directly From IBM i
This article discusses the options of where to implement APIs for IBM i based applications and why most companies switch to integration platforms.
December 12, 2022
by Dmitriy Kuznetsov
· 2,841 Views · 1 Like
article thumbnail
Better Two Factor Authentication Experiences With WebOTP
This article explains how the WebOTP API makes for better two-factor authentication experiences on the web.
December 12, 2022
by Phil Nash
· 2,569 Views · 3 Likes
article thumbnail
What Approach to Assess the Level of Security of My IS?
This article aims to paint the portrait of three approaches that will allow you to proactively assess the level of security of all or part of your computer system.
December 12, 2022
by Usama Amin
· 2,200 Views · 1 Like
article thumbnail
The State of Deepfakes in Cyber Attacks
Here is a look at what deepfakes are, how they are made, and how AI systems are fighting deepfake cyber attacks.
December 9, 2022
by Zac Amos
· 3,126 Views · 1 Like
article thumbnail
Secure Shell Protocol: Everything You Need to Know
In this article, we will study all about secure shell protocol and explore its working, its concepts, and the mechanisms it leverages for safe remote access.
December 9, 2022
by Eden Allen
· 3,329 Views · 1 Like
article thumbnail
Top 5 Network Security Risks in 2023
Modern network security takes a layered approach to protect the many edges of the network and network perimeter. Explore basics and risks of network security.
December 8, 2022
by Gilad David Maayan CORE
· 4,642 Views · 2 Likes
article thumbnail
Why Choose AWS as a “Well- Architectured Framework?”
This article explains in detail why AWS is considered a well-architected framework for serverless applications.
December 8, 2022
by Hiren Dhaduk
· 3,855 Views · 1 Like
article thumbnail
How To Mitigate API Risks During Development
To effectively monitor security of APIs, you need to take the necessary steps and know what to look for in API code.
December 7, 2022
by Idan Elor
· 2,943 Views · 1 Like
article thumbnail
What Are the Biggest Struggles With Implementing Security for a Blockchain Project?
The area of blockchain security is constantly experiencing unanticipated hazards, which raises the question, "Is Blockchain genuinely secure?"
December 7, 2022
by Stylianos Kampakis
· 2,447 Views · 1 Like
article thumbnail
Catastrophic Backtracking: How Can a Regular Expression Cause a ReDoS Vulnerability?
In some cases, regular expressions may cause the system to slow down or even make vulnerable to ReDoS attacks.
December 7, 2022
by Andrey Moskalev
· 3,198 Views · 2 Likes
article thumbnail
Flow and Cadence Best Practices, Patterns, and Anti-Patterns
Learn tips that will help you create a better user experience and ensure a consistent level of security throughout the Flow ecosystem.
December 6, 2022
by John Vester CORE
· 35,283 Views · 2 Likes
article thumbnail
5 Trends That Will Shape Application Security in 2023
Keep a pulse on these 5 trends that will shape the future of application security.
December 6, 2022
by Harshil Parikh
· 3,341 Views · 1 Like
article thumbnail
10 Best Practices to Launch APIs in 2023
The guide can help launch successful APIs while gauging the potential issues and keeping things on track.
December 5, 2022
by $$anonymous$$
· 4,405 Views · 3 Likes
article thumbnail
When NOT To Choose Amazon MSK Serverless for Apache Kafka
Comparison and trade-offs of Amazon MSK Serverless with other fully-managed SaaS Kafka cloud services like Confluent Cloud.
December 5, 2022
by Kai Wähner CORE
· 2,558 Views · 2 Likes
article thumbnail
How To Set Parameters When Establishing an MQTT Connection
This article introduces the role of each connection parameter in MQTT and helps developers take their first steps in using MQTT.
December 5, 2022
by Weihong Zhang
· 1,872 Views · 1 Like
article thumbnail
Secure Kubernetes With Kubescape
Kubernetes is powerful — but complex. It’s easy to leave a cluster vulnerable to attack. The first line of defense are automated security checks.
December 1, 2022
by Tomas Fernandez
· 3,275 Views · 2 Likes
article thumbnail
SaaS Application Patching and Upgrade Testing: Preparing for Readiness is the Key
Patching and upgrade testing becomes an important aspect as any major/minor issue will impact the business functions at large.
December 1, 2022
by Sridhar Potladurti
· 2,801 Views · 1 Like
article thumbnail
Cybersecurity: How to Identify Vulnerabilities
Cybersecurity is also critical in preventing attacks that aim to disable or disrupt the operations of a system or device.
December 1, 2022
by Usama Amin
· 3,626 Views · 1 Like
article thumbnail
DevSecOps and Digital Transformation: Bridging the Security Gap
This article is about DevSecOps, it's working, and its importance in modern technology.
November 30, 2022
by Linda A. Boutte
· 4,724 Views · 1 Like
article thumbnail
Health Apps and Data Privacy: Best Practices for Developers
While health and wellness apps can be useful tools, they also raise important privacy issues.
November 30, 2022
by William Bates
· 6,264 Views · 1 Like
  • Previous
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: