DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

The Latest Security Topics

article thumbnail
Build a Flow Collectibles Portal Using Cadence (Part 2)
With a Collectibles portal on the Flow blockchain and deployed to the testnet we can now focus on creating the frontend using React in the conclusion of this series.
February 26, 2024
by John Vester DZone Core CORE
· 18,577 Views · 1 Like
article thumbnail
The Art of Ethical Hacking: Securing Systems in the Digital Age
Ethical hacking utilizes techniques for positive purposes, safeguarding digital systems from cyber threats by identifying vulnerabilities before malicious hackers.
February 26, 2024
by faboye michael
· 1,804 Views · 1 Like
article thumbnail
Web Application Security: The Ultimate Guide to Coding Best Practices
Explore best practices and core considerations for writing secure code across web applications in this all-encompassing guide.
February 26, 2024
by Igboanugo David Ugochukwu
· 2,495 Views · 4 Likes
article thumbnail
Security Best Practices for Docker Images
In this guide, we will explore security best practices for Docker images to help you create and maintain secure images for your containerized applications.
February 26, 2024
by Aditya Bhuyan
· 3,097 Views · 2 Likes
article thumbnail
Secure Your API With These 16 Practices With Apache APISIX (Part 1)
A couple of months ago, I stumbled upon this list. In this two-post series, I'd like to describe how we can implement each point with Apache APISIX (or not).
February 23, 2024
by Nicolas Fränkel DZone Core CORE
· 4,776 Views · 1 Like
article thumbnail
Enabling Compliance and Security in AI-Driven, Low-Code/No-Code Development
Low-code/no-code development offers a lot of opportunities for companies across sectors, but it can also bring new security risks and compliance concerns.
February 23, 2024
by Ben Kliger
· 4,749 Views · 1 Like
article thumbnail
The Use of Machine Learning in Cybersecurity: Threat Detection and Prevention
Learn how machine learning boosts cybersecurity by detecting and preventing threats effectively. Explore its pivotal role in safeguarding digital systems.
February 23, 2024
by faboye michael
· 4,966 Views · 1 Like
article thumbnail
Tips To Help GitHub Admins Prepare A Company For SOC 2 And ISO 27001 Audits
Source code protection is highly important nowadays, and when your data is well protected according to the best standards, it becomes an absolute must.
February 23, 2024
by Daria Kulikova
· 4,727 Views · 2 Likes
article thumbnail
Exploring the Nexus Between DevSecOps and Cybersecurity
Explore the vital connection between development, security practices, and the evolving landscape of cybersecurity here in this blog!
February 23, 2024
by Ruchita Varma
· 4,045 Views · 1 Like
article thumbnail
Hiding Data in DB2
Fine-grained access control is usually done in the database, but a programmable proxy can sometimes be used as an alternative. Learn more in this article.
February 22, 2024
by Max Tardiveau
· 2,807 Views · 1 Like
article thumbnail
Common Cybersecurity Threats and How To Protect Yourself
Cybercriminals are continuously concocting new strategies and procedures, requiring a continuous obligation to remain educated and careful.
February 22, 2024
by faboye michael
· 2,776 Views · 1 Like
article thumbnail
Securing the Digital Frontline: Cybersecurity Trends and Best Practices in Networking
The need for robust cybersecurity measures in networking has never been more critical. This article delves into the latest trends and best practices in cybersecurity.
February 22, 2024
by Zain Ul Abidin
· 2,426 Views · 1 Like
article thumbnail
Safe Clones With Ansible
In this tutorial, learn how to safely clone private Git repos from Ansible by using temporary GitHub deploy keys.
February 22, 2024
by Jan-Rudolph Bührmann
· 4,044 Views · 1 Like
article thumbnail
Cybersecurity: A Trojan Horse in Our Digital Walls?
An opinion piece on how cybersecurity attacks will evolve to be much more threatening when augmented by AI advances like LLMs and LMMs.
February 21, 2024
by Smit Dagli
· 2,180 Views · 2 Likes
article thumbnail
Launch Your Ethereum Donation dApp Today: Easy Steps With MetaMask, Alchemy, and GitHub Codespaces
This guide offers a straightforward walkthrough on building and launching your first Ethereum dApp, "BuyACoffee," using MetaMask, Alchemy, and GitHub Codespaces.
February 21, 2024
by Rajesh Gheware
· 2,015 Views · 1 Like
article thumbnail
NIST AI Risk Management Framework: Developer’s Handbook
The NIST AI Risk Management Framework offers a comprehensive approach to addressing the complex challenges associated with managing risks in AI technologies.
February 19, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 3,519 Views · 11 Likes
article thumbnail
Top Secrets Management Tools for 2024
Secrets managers/vaults are one of the best ways to keep your passwords, API keys, access tokens, and more available to you and out of the hands of bad actors.
February 19, 2024
by Greg Bulmash
· 4,937 Views · 5 Likes
article thumbnail
Safeguarding Web Applications With Cloud Service Providers: Anti-CSRF Tokenization Best Practices
Cloud service providers bolster security with Anti-CSRF tokenization and IDS, strengthening web app defenses against evolving threats such as CSRF attacks.
February 16, 2024
by Cheena Shekhawat
· 6,588 Views · 1 Like
article thumbnail
Don't Just Let It iPaaS: How To Get More Out of Your Digital Transformation
Learn about the fundamental principles of iPaaS that can accelerate digital transformation at an incredible pace.
February 16, 2024
by Shivank Shukla
· 7,218 Views · 2 Likes
article thumbnail
The Noticeable Shift in SIEM Data Sources
Early SIEM solutions faced hurdles, especially from their data sources. Learn about their evolution over time from cloud to IoT Devices, among others.
February 15, 2024
by Diamaka Aniagolu
· 4,113 Views · 2 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: