DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

The Latest Security Topics

article thumbnail
Empowering Developers With Scalable, Secure, and Customizable Storage Solutions
StoneFly simplifies data storage with scalable, secure, and customizable solutions. Seamless integration and unbeatable value for developers and businesses.
March 22, 2024
by Tom Smith DZone Core CORE
· 5,430 Views · 1 Like
article thumbnail
Modern Digital Authentication Protocols
The article will explore the basic theory behind the use of digital authentication protocols and simple examples of situations in which they are used.
March 22, 2024
by Divya Marupaka
· 4,961 Views · 3 Likes
article thumbnail
Getting Started With NCache Java Edition (Using Docker)
Learn how to get started with NCache Java Edition using Docker with step-by-step processes involving the creation of a clustered cache server.
March 22, 2024
by Gowtham K
· 9,020 Views · 2 Likes
article thumbnail
Securing Cloud Storage Access: Approach to Limiting Document Access Attempts
Explore how to secure cloud documents and images by limiting access attempts using GUIDs, tokens, and tracking, enhancing security for image rendering.
March 21, 2024
by Amol Gote DZone Core CORE
· 4,022 Views · 4 Likes
article thumbnail
Role-Based Multi-Factor Authentication
Multi-factor authentication is being adopted by more and more organizations these days because putting it in place greatly increases security.
March 21, 2024
by Sriram Panyam
· 2,608 Views · 5 Likes
article thumbnail
The Role of Data Brokers in Software Development: Navigating Ethics and Privacy Concerns
Discover how data brokers impact software development, ethics, and privacy. Gain insights into user behavior and preferences.
March 21, 2024
by Oliver Stone
· 2,823 Views · 1 Like
article thumbnail
Exploring the Comprehensive World of Burp Suite
Burp Suite is one of the tools available for security testing; a flexible and strong platform that helps security experts evaluate web applications' security posture.
March 21, 2024
by Vaishnavi Nayak
· 2,861 Views · 2 Likes
article thumbnail
Remote Work Security Tips for Developers
Best practices for remote work security for developers include creating office setup standards, requiring cybersecurity training, providing immediate support, and more.
March 21, 2024
by Zac Amos
· 3,048 Views · 1 Like
article thumbnail
Securing Cloud Infrastructure: Leveraging Key Management Technologies
This article explores the world of secure key management, the intricacies of KMS and HSM, their benefits, use cases, key considerations, and best practices.
March 20, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 2,586 Views · 3 Likes
article thumbnail
API Governance: Ensuring Control and Compliance in the Era of Digital Transformation
This comprehensive article explores the significance of API governance, its key components, and best practices for implementation.
March 20, 2024
by Lakshmi Sushma Daggubati
· 2,257 Views · 1 Like
article thumbnail
DevSecOps: Bridging the Gap Between Speed and Security
The article covers how DevSecOps merges security with DevOps, focusing on quick, secure software development through automation and ongoing security checks.
March 20, 2024
by Rajesh Gheware
· 1,640 Views · 1 Like
article thumbnail
SOC 2 Audits as a Pillar of Data Accountability
SOC 2 audits are critical for cloud data security, ensuring companies meet standards for managing customer data with a focus on security, availability, and privacy.
March 20, 2024
by Suhas Jangoan
· 2,092 Views · 2 Likes
article thumbnail
Secure Your Heroku Apps With SSL
If you’re building an application that needs to go toward production, you’ll undoubtedly need to serve it up securely with SSL.
March 20, 2024
by Joseph Caudle
· 1,523 Views · 1 Like
article thumbnail
The Impact of Biometric Authentication on User Privacy and the Role of Blockchain in Preserving Secure Data
Blockchain technology is a novel solution to privacy concerns and risks associated with the storage and maintenance of biometric data.
March 20, 2024
by Saurav Bhattacharya
· 2,928 Views · 2 Likes
article thumbnail
The Future of Incident Response: SOAR's Impact on Cybersecurity Defense
Discover how SOAR is revolutionizing incident response strategies, safeguarding organizations from relentless cyber threats. Stay ahead of the curve.
March 20, 2024
by Chandan Saxena
· 2,314 Views · 1 Like
article thumbnail
Design Principles-Building a Secure Cloud Architecture
To ensure cloud security, adopt key principles like least privilege, fail-safe design, and a zero-trust model for creating a robust and adaptive cloud architecture.
March 19, 2024
by Suhas Jangoan
· 2,518 Views · 2 Likes
article thumbnail
10 Commandments of API-First Development
The article offers ten vital API guidelines, emphasizing design, security, and efficiency for business success.
March 19, 2024
by Vivin Nath
· 1,920 Views · 2 Likes
article thumbnail
The Power of AI: Building a Robust Data Ecosystem for Enterprise Success
The article emphasizes the importance of building a comprehensive data ecosystem for enterprises, covering key principles, critical components, and value drivers for success.
March 19, 2024
by Siddharth Rajagopal
· 2,485 Views · 2 Likes
article thumbnail
Secure Your API With JWT: Kong OpenID Connect
In this article, walk through the issues of session-based authorization and the benefits of stateless tokens, namely JWT.
March 19, 2024
by Adam Zaręba
· 3,232 Views · 3 Likes
article thumbnail
Exploring Zero-Trust Architecture Implementation in Modern Cybersecurity
Zero-trust flips conventional security on its head by shifting from an implicit trust model to one where verification is required every step of the way.
March 19, 2024
by Igboanugo David Ugochukwu
· 2,879 Views · 2 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: