DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

The Latest Security Topics

article thumbnail
Rethinking DevOps in 2024: Adapting to a New Era of Technology
Emerging technologies, evolving methodologies, and changing business needs are redefining what it means to implement DevOps practices effectively.
March 18, 2024
by Ankush Madaan
· 1,958 Views · 1 Like
article thumbnail
Initializing Services in Node.js Application
An in-depth guide on managing service initialization in Node.js applications, illustrated with a refined JWT Service example.
March 18, 2024
by Anton Kalik
· 2,631 Views · 2 Likes
article thumbnail
Understanding the 2024 Cloud Security Landscape
This post stresses the importance of enhanced cloud security, advocating for unified security practices and Zero Trust Architecture to protect against threats.
March 16, 2024
by Rajat Gupta
· 5,625 Views · 6 Likes
article thumbnail
Building a Sustainable Data Ecosystem
Generative AI brings innovation, but it also brings challenges in privacy, fairness, and accountability in data sharing.
March 15, 2024
by Chidumga Izuzu
· 4,358 Views · 6 Likes
article thumbnail
Four Common CI/CD Pipeline Vulnerabilities
The continuous integration/continuous delivery (CI/CD) pipeline can contain numerous vulnerabilities for hackers to exploit. Here's how to address them.
March 14, 2024
by Zac Amos
· 3,296 Views · 1 Like
article thumbnail
Elevate Your Security Posture: Grafana for Real-Time Security Analytics and Alerts
This article provides a detailed walkthrough on setting up Grafana for real-time security monitoring, crafting insightful dashboards, and configuring effective alerts.
March 14, 2024
by Rajesh Gheware
· 3,616 Views · 1 Like
article thumbnail
Cohesity Simplifies Data Management and Security for Developers
Simplified data management and security for developers with a converged, AI-powered platform streamlines workflows and unlocks insights.
March 14, 2024
by Tom Smith DZone Core CORE
· 3,184 Views · 1 Like
article thumbnail
7 Essential Practices for Secure API Development
Master API security with our top 7 practices for safe and reliable API development. Ensure robust software with our expert guide.
March 12, 2024
by Boris Bodin
· 2,159 Views · 1 Like
article thumbnail
Navigating the Shift: Mastering Pod Security in Kubernetes
Master the shift to Pod Security Admission (PSA) in Kubernetes 1.25 with our guide, unlocking advanced security for your deployments.
March 12, 2024
by Rajesh Gheware
· 3,978 Views · 1 Like
article thumbnail
How Secure Cloud Development Replaces Virtual Desktop Infrastructures
Learn how secure cloud development environments provide a replacement for secure laptops and virtual desktop infrastructures for secure application development.
March 12, 2024
by Laurent Balmelli, PhD
· 3,740 Views · 2 Likes
article thumbnail
OWASP Top 10 Explained: SQL Injection
This post discusses SQL Injection (SQLi), its types, examples of breaches, and prevention methods to protect against this cybersecurity threat.
March 12, 2024
by Pier-Jean MALANDRINO DZone Core CORE
· 4,813 Views · 4 Likes
article thumbnail
When a Data Mesh Doesn’t Make Sense for Your Organization
Data mesh—including data mesh governance—requires the right mix of process, tooling, and internal resources. Find out what it takes to get data mesh-ready.
March 11, 2024
by Lior Gavish
· 1,674 Views · 1 Like
article thumbnail
Beyond the Call: AI and Machine Learning’s Role in Evolving Vishing Cyber Threats
The social engineering tactic of vishing is a growing problem; you must understand it first in order to properly defend yourself.
March 11, 2024
by Luis Maldonado
· 1,774 Views · 1 Like
article thumbnail
Seamless Integration: Connecting AWS Lambda to RDS and Writing Data Effortlessly
This comprehensive guide walks you through the process of setting up AWS Lambda to connect to an RDS instance and write data to tables, step-by-step.
March 9, 2024
by Vijay Panwar
· 5,321 Views · 1 Like
article thumbnail
Solix Empowers the Data-Driven Enterprise With Comprehensive Data Management and Integration Solutions
How Solix helps data-driven enterprises manage and integrate data to get more value for more people with less time and less money.
March 9, 2024
by Tom Smith DZone Core CORE
· 5,040 Views · 1 Like
article thumbnail
Introduction to Modern Data Stack
Exploring how the modern data stack revolutionizes data management with scalable cloud solutions, automated tools, and advanced analytics capabilities.
March 8, 2024
by Suhas Jangoan
· 3,736 Views · 5 Likes
article thumbnail
Setup With Pritunl
This documentation provides a guide to setting up a Virtual Private Network (VPN) server using Pritunl, a popular open-source VPN server management platform.
March 8, 2024
by Himanshu Bansal
· 3,713 Views · 3 Likes
article thumbnail
Mitigating Adversarial Attacks: Strategies for Safeguarding AI Systems
This article explores key strategies for mitigating adversarial manipulation and ensuring robust operations in real-world applications.
March 7, 2024
by Ramakrishnan Neelakandan
· 2,211 Views · 3 Likes
article thumbnail
Incident Management: Checklist, Tools, and Prevention
This article summarizes incident management and how to deal with and survive an outage that occurs in your software.
March 7, 2024
by Naga Santhosh Reddy Vootukuri
· 3,125 Views · 2 Likes
article thumbnail
How Blockchain Tech Can Improve DevOps Practices in Web3
Current DevOps tools and practices can help develop applications on top of blockchains, and a more mature blockchain adoption can improve the DevOps practices in return.
Updated March 7, 2024
by John Vester DZone Core CORE
· 71,560 Views · 2 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: