DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

The Latest Security Topics

article thumbnail
Decrypting the Future: Unveiling Questions on AI's Role in Cybersecurity
Do you know AI is revolutionizing digital defense, tackling key questions and implications for the industry? Get insights from experts.
March 6, 2024
by Chandan Saxena
· 1,784 Views · 2 Likes
article thumbnail
iOS Application Security for Beginners
This article provides a brief overview of techniques that can be used in your mobile iOS application to keep it secure enough for the vast majority of cases.
March 6, 2024
by Aleksei Pichukov
· 1,625 Views · 1 Like
article thumbnail
Cybersecurity in the Cloud: Integrating Continuous Security Testing Within DevSecOps
AI assisted cyberattacks against cloud infrastructure is a fast growing threat. Integrating CST within DevSecOps serves as a crucial weapon for organizations.
March 5, 2024
by Prithvish Kovelamudi
· 3,785 Views · 7 Likes
article thumbnail
Ensuring Security and Compliance: A Detailed Guide to Testing the OAuth 2.0 Authorization Flow in Python Web Applications
In this detailed guide, walk through building a simple OAuth 2.0 Authorization Server using Python 3 and the popular web framework, Flask.
March 5, 2024
by Vijay Panwar
· 2,823 Views · 1 Like
article thumbnail
Unpacking Our Findings From Assessing Numerous Infrastructures (Part 2)
Making superior performance accessible. Get better at assessing your core infrastructure needs, find out where engineering teams often falter.
March 5, 2024
by Komal J Prabhakar
· 3,533 Views · 2 Likes
article thumbnail
Secure Your API With These 16 Practices With Apache APISIX (Part 2)
Last week, we listed 16 practices to help secure one's APIs and described how to implement them with Apache APISIX. This week, we will look at the remaining practices.
March 4, 2024
by Nicolas Fränkel DZone Core CORE
· 1,883 Views · 1 Like
article thumbnail
Guarding the Gates of GenAI: Security Challenges in AI Evolution
This guide helps you understand the security challenges in GenAI Evolution and discusses robust measures to mitigate potential leaks, manipulation, and misuse.
March 4, 2024
by Phani Kumar Varma Kokkerlapati
· 2,143 Views · 2 Likes
article thumbnail
Integrating Software Supply Chains and DevOps: Tips for Effectively Reconciling Supply Chain Management and DevOps
Enacting visibility, input, and accountability for both the development and operations teams ensures secure SSCs and provides an opportunity to strengthen DevOps culture.
March 3, 2024
by Justin Albano DZone Core CORE
· 5,554 Views · 1 Like
article thumbnail
Maximizing Feedback for Developers With Continuous Testing
Maximize software development feedback with continuous testing, incorporating multiple loops and Deming's philosophy. Enhance code quality and security.
March 1, 2024
by Mike Harris
· 5,893 Views · 1 Like
article thumbnail
Securing and Monitoring Your Data Pipeline: Best Practices for Kafka, AWS RDS, Lambda, and API Gateway Integration
Learn how to implement a data pipeline that integrates Apache Kafka with AWS RDS and use AWS Lambda and API Gateway to feed data into a web application.
February 29, 2024
by Vijay Panwar
· 4,925 Views · 1 Like
article thumbnail
The Role of Penetration Testing in Strengthening Cyber Defenses
Penetration testing strengthens cyber defenses by simulating attacks, identifying vulnerabilities, and enhancing security measures.
February 28, 2024
by Favour Efeoghene
· 4,392 Views · 3 Likes
article thumbnail
An Approach To Synthetic Transactions With Spring Microservices: Validating Features and Upgrades
Learn how synthetic transactions in fintech help in assuring quality and confidence, validating business functionality post major updates or new features.
February 27, 2024
by Amol Gote DZone Core CORE
· 6,169 Views · 6 Likes
article thumbnail
Critical Infrastructure Protection in the Age of Cyber Threats
Safeguarding critical infrastructure from cyber threats is paramount. Robust defenses and proactive measures are essential for resilience in today's digital landscape.
February 27, 2024
by faboye michael
· 3,079 Views · 1 Like
article thumbnail
Top 5 Common Cybersecurity Attacks MSPs Should Know in 2024
Discover the cybersecurity attacks targeting MSPs in 2024, and learn how incorporating a robust backup solution can be a game-changer in your cyber defense strategy.
February 27, 2024
by Alex Tray
· 2,278 Views · 1 Like
article thumbnail
Explore Salesforce OAuth Authorization Flows and Its Use Cases
Depending on your use case, you can decide which flow to use for a client app to get an access token to access data in Salesforce.
February 27, 2024
by Jaseem Pookandy
· 2,097 Views · 1 Like
article thumbnail
AI Against AI: Harnessing Artificial Intelligence To Detect Deepfakes and Vishing
This article looks at the technologies behind these digital deceptions, their societal implications, and the AI-driven techniques designed to detect them.
February 27, 2024
by venkataramaiah gude
· 2,377 Views · 2 Likes
article thumbnail
Fortifying Web Applications: A Guide To Preventing SQL Injection in AWS RDS SQL Server
This article delves into effective strategies and practices for protecting your RDS SQL Server from SQL injection attacks.
February 27, 2024
by Vijay Panwar
· 2,929 Views · 2 Likes
article thumbnail
Unveiling the Power of Virtual Private Networks (VPNs)
We will delve into the world of VPNs, exploring their functionality, benefits, potential drawbacks, and how they contribute to a secure and private online experience.
February 27, 2024
by Aditya Bhuyan
· 2,236 Views · 1 Like
article thumbnail
Automating Policy Enforcement in Kubernetes Using OPA: A Step-By-Step Tutorial
Kubernetes policy enforcement with OPA. Master security and compliance in your cloud-native environment with easy-to-follow steps and practical examples.
February 26, 2024
by Rajesh Gheware
· 4,874 Views · 1 Like
article thumbnail
Best Practices To Secure Stateless REST Applications
Explore security management in stateless REST applications, including authentication, access control models, and handling security threats.
February 26, 2024
by Gabriel L. Manor
· 4,466 Views · 8 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: