DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

SBOMs are essential to circumventing software supply chain attacks, and they provide visibility into various software components.

The Latest Security Topics

article thumbnail
ISO 27001 vs SOC 2: Understanding the Differences
ISO 27001 and SOC 2 are frameworks for information security. Choose ISO 27001 (global ISMS certification provider) or SOC 2 (data controls) based on your security needs.
January 16, 2025
by Sam Arsh
· 3,359 Views · 2 Likes
article thumbnail
Bye Tokens, Hello Patches
Meta's BLT architecture is a better way to scale LLMs that may lead us to replace tokenization with a patches-based approach.
January 15, 2025
by mike labs
· 3,507 Views · 2 Likes
article thumbnail
Advanced Bot Mitigation Using Custom Rate-Limiting Techniques
Custom rate limiting reduces bot traffic, cuts costs by 80%, improves stability by 50%, and enhances detection accuracy by 70% without disrupting user experience.
January 15, 2025
by Mikhail Baranov
· 16,485 Views · 65 Likes
article thumbnail
Data-First IDP: Driving AI Innovation in Developer Platforms
A Data-First IDP integrates governance, traceability, and quality into workflows, transforming how data is managed, enabling scalable, AI-ready ecosystems.
January 15, 2025
by Paul Gale
· 5,952 Views · 2 Likes
article thumbnail
AWS Nitro Enclaves: Enhancing Security With Isolated Compute Environments
AWS Nitro Enclaves are perfect for processing sensitive information and meeting compliance requirements while maintaining operational efficiency.
January 14, 2025
by Sajith Narayanan
· 12,823 Views · 1 Like
article thumbnail
Buildpacks: An Open-Source Alternative to Chainguard
As the industry's need for secure container images is jumping, an OSS Docker alternative provides a solid foundation to solve that issue.
January 13, 2025
by Sylvain Kalache
· 9,015 Views · 3 Likes
article thumbnail
Security in the Age of AI: Challenges and Best Practices
Key security challenges in AI and strategies to protect systems, from data breaches to adversarial attacks, to ensure robust and secure AI integration.
January 13, 2025
by Akanksha Pathak DZone Core CORE
· 3,329 Views · 3 Likes
article thumbnail
A Hands-On Guide to Enable Amazon GuardDuty on AWS Account
This hands-on guide will help you enable Amazon GuardDuty via the AWS Console in order to monitor and detect security threats in your AWS environment.
January 9, 2025
by Sai Sandeep Ogety DZone Core CORE
· 4,130 Views · 13 Likes
article thumbnail
AI Governance: Building Ethical and Transparent Systems for the Future
This article takes a deep dive into AI governance, including insights surrounding its challenges, frameworks, standards, and more.
January 9, 2025
by Sukanya Konatam
· 7,365 Views · 2 Likes
article thumbnail
Non-Human Identity Security Strategy for Zero Trust Architecture
Explore NIST-backed guidance on securing non-human Identities, reducing risks, and aligning with zero-trust principles in cloud-native infrastructures.
January 9, 2025
by Dwayne McDaniel
· 4,569 Views · 1 Like
article thumbnail
API and Security: From IT to Cyber
Learn how to protect your APIs beyond the basics. This article explores the risks, but also the solutions, which are not necessarily limited to the API Manager.
January 8, 2025
by Thomas Jardinet DZone Core CORE
· 5,341 Views · 3 Likes
article thumbnail
AWS Cloud Security: Key Components, Common Vulnerabilities, and Best Practices
Organizations can achieve a robust security posture in AWS by understanding key AWS security components, mitigating vulnerabilities, and adhering to best practices.
January 8, 2025
by John Akkarakaran Jose
· 6,054 Views · 3 Likes
article thumbnail
Understanding WebRTC Security Architecture and IoT
Learn more about how WebRTC's triple-layer security architecture protects IoT communications and creates the building blocks of secure device interactions.
January 8, 2025
by Carsten Rhod Gregersen
· 5,959 Views · 1 Like
article thumbnail
Securely Sign and Manage Documents Digitally With DocuSign and Ballerina
Integrate DocuSign with Ballerina, enabling straightforward interaction with DocuSign APIs to send envelopes, manage recipients, and track statuses.
January 8, 2025
by Nuvindu Hewapathirana
· 5,190 Views · 3 Likes
article thumbnail
Enhancing Cloud Cybersecurity for Critical Infrastructure Protection
Cloud computing enhances infrastructure but raises security risks. Developers must secure systems with zero trust, automation, and collaboration.
January 7, 2025
by Pooyan Hamidi
· 3,024 Views · 2 Likes
article thumbnail
On SBOMs, BitBucket, and OWASP Dependency Track
Learn how to send your system's SBOM from BitBucket to Dependency Track for dashboarding of vulnerabilities and onerous license conditions.
January 7, 2025
by Jan-Rudolph Bührmann
· 3,784 Views · 2 Likes
article thumbnail
Data Governance Challenges in the Age of Generative AI
Navigate privacy, security, and compliance challenges for innovation. Effective data governance is now more critical due to recent generative AI developments.
January 7, 2025
by nishchai jayanna manjula
· 5,941 Views · 3 Likes
article thumbnail
Achieving Security and Trust in a Data Fabric: The Role of Zero Trust Architecture
Explore how zero-trust architecture (ZTA) can provide a solid foundation for achieving security and trust in a data fabric.
January 6, 2025
by Julian Durand
· 4,365 Views · 3 Likes
article thumbnail
Emerging Mobile Threats and Defensive Strategies for Developers
The growth of mobile tech drives innovation but also invites risks. Learn about emerging threats to mobile applications with detailed examples and insights.
January 6, 2025
by Vikesh Dudhankar
· 63,112 Views · 2 Likes
article thumbnail
Optimizing GitHub Access Management for Enterprises: Enhancing Security, Scalability, and Continuity with Jenkins GitHub App Authentication and Load Balancing
Jenkins GitHub App authentication with load balancing boosts security, scalability, and reliability, reducing risks in enterprise CI/CD workflows.
January 2, 2025
by Deepti Marrivada
· 5,146 Views · 1 Like
  • Previous
  • ...
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: