DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Security Topics

article thumbnail
Logical Reasoning in Network Problems
Online issues can be highly complex, requiring the capture of key information for a clear understanding. Through logical reasoning, the root cause was pinpointed.
January 1, 2025
by Bin Wang
· 6,914 Views · 4 Likes
article thumbnail
Kubernetes Ephemeral Containers: Enhancing Security and Streamlining Troubleshooting in Production Clusters
Ephemeral containers in Kubernetes offer secure, short-lived debugging without disturbing primary workloads, then vanish — reducing risk and overhead.
December 30, 2024
by Sai Sandeep Ogety DZone Core CORE
· 10,209 Views · 13 Likes
article thumbnail
How to Build a YouTube Clone With Svelte.js, Firebase, and Permit.io
Creating a video-sharing app like YouTube is not just about front-end design and data storage; you should have secure control over what users can see and do.
December 25, 2024
by Ekekenta Odionyenfe
· 5,833 Views · 2 Likes
article thumbnail
Strengthening Cloud Security: Privacy-Preserving Techniques for Compliance With Regulations and the NIST Framework
As cloud adoption increases, it becomes essential to secure data while adhering to GDPR, CCPA, and HIPAA regulations through the use of privacy-preserving techniques.
December 25, 2024
by Dorababu Nadella
· 4,754 Views · 1 Like
article thumbnail
Data Privacy and Security: A Developer's Guide to Handling Sensitive Data With DuckDB
Master sensitive data handling with DuckDB in this guide to implementing data privacy techniques such as PII masking (includes practical Python code examples).
December 23, 2024
by Anil Kumar Moka
· 11,871 Views · 1 Like
article thumbnail
The Art of Prompt Engineering in Incident Response
Explore the foundations, benefits, and best practices for mastering prompt engineering in Incident Response.
December 23, 2024
by Dimple Gajra
· 3,513 Views · 2 Likes
article thumbnail
How to Test PATCH Requests for API Testing With Playwright Java
This tutorial demonstrates how to test PATCH requests using the Playwright Java framework for API testing, using examples of partially updating data of an API.
December 20, 2024
by Faisal Khatri DZone Core CORE
· 13,095 Views · 3 Likes
article thumbnail
Docker Security Best Practices for Enterprise Applications: From Development to Production
Docker security in enterprise environments needs a multi-layered approach: image building, runtime protection, network security, and secrets management.
December 19, 2024
by Anil Kumar Moka
· 9,974 Views · 5 Likes
article thumbnail
Zero Trust for AI: Building Security from the Ground Up
Zero-trust AI takes a proactive approach to security, protecting your data, workflows, and systems to keep everything safe and reliable.
December 18, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 4,570 Views · 3 Likes
article thumbnail
5 Signs You’ve Built a Secretly Bad Architecture (And How to Fix It)
Let’s figure out how to mitigate these five issues and transform your architecture into a strong foundation for innovation.
December 18, 2024
by John Vester DZone Core CORE
· 41,959 Views · 7 Likes
article thumbnail
Deploying LLMs Securely With OWASP Top 10
The OWASP Top 10 guide lays out best practices for securely implementing GenAI applications that rely on LLMs.
December 17, 2024
by Nigel Douglas
· 6,474 Views · 1 Like
article thumbnail
Implementing OneLake With Medallion Architecture in Microsoft Fabric
This guide to Microsoft OneLake covers structured layers and security, enabling high-quality data optimization for analytics.
December 17, 2024
by Aravind Nuthalapati DZone Core CORE
· 24,145 Views · 3 Likes
article thumbnail
Strengthening IAM Security for Cloud IaaS Accounts
This guide will help you implement IAM-specific configurations in your OCI tenancy account to enhance security and protect your cloud infrastructure.
December 16, 2024
by Deepak Antiya
· 2,890 Views
article thumbnail
Enhancing Security in Kubernetes: A Comparative Analysis of Cosign and Connaisseur
Boost Kubernetes security with Cosign's image signing and Connaisseur's strict verification. Learn how these tools protect your containers from unauthorized access.
December 16, 2024
by Kuppusamy Vellamadam Palavesam
· 4,771 Views · 1 Like
article thumbnail
Dropwizard vs. Micronaut: Unpacking the Best Framework for Microservices
Discover the best option for building efficient and scalable microservices by reading this comparison of Dropwizard and Micronaut frameworks.
December 16, 2024
by Nilesh Jain
· 16,026 Views · 5 Likes
article thumbnail
Securing APIs in Modern Web Applications
Learn about key practices for securing APIs in modern web apps, including authentication, encryption, and monitoring, to guard against vulnerabilities.
December 16, 2024
by Michal Clarke
· 3,505 Views · 2 Likes
article thumbnail
Mastering Seamless Single Sign-On: Design, Challenges, and Implementation
Key insights on designing seamless SSO systems, integrating OAuth2 and SAML, and balancing security, performance, and user experience challenges effectively.
December 12, 2024
by Rinku Mohan
· 4,606 Views · 9 Likes
article thumbnail
A Practical Guide to Securing NodeJS APIs With JWT
JWT secures your Node.js/Express APIs statelessly, ensuring each request is authenticated with a lightweight, tamper-proof token for scalable, modern security.
December 10, 2024
by Anujkumarsinh Donvir DZone Core CORE
· 7,518 Views · 11 Likes
article thumbnail
Demystifying Kubernetes in 5 Minutes
Take a few minutes to learn about Kubernetes: a powerful container orchestration platform that simplifies the management of applications.
December 10, 2024
by Samarth Shah
· 10,260 Views · 6 Likes
article thumbnail
Building Secure Containers: Reducing Vulnerabilities With Clean Base Images
Reduce container vulnerabilities by using minimal, clean base images like scratch or Alpine and scan tools like Clair, Trivy, and Anchore.
December 9, 2024
by Satyanarayana Raju
· 5,361 Views · 2 Likes
  • Previous
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: