DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

The Latest Security Topics

article thumbnail
K8s Network Policy Automation in Falco Talon
Protect your Kubernetes environment with Talon Response Actions. Automatically enforce Calico Network Policies to secure your network and stay compliant.
February 14, 2024
by Nigel Douglas
· 4,227 Views · 2 Likes
article thumbnail
Securing Applications Throughout the Software Development Lifecycle
Embed security throughout SDLC, utilize pentesting, and follow frameworks like ISO 27034 and OWASP SAMM to strengthen defenses against costly breaches.
February 14, 2024
by Den Smyrnov
· 1,902 Views · 1 Like
article thumbnail
Integration Security and Safety When Connecting With External Systems
Integration security is all about safeguarding your data in connected systems. In this article, we'll explore various best practices to ensure your integration is secure.
February 13, 2024
by Teja Bhutada
· 2,866 Views · 1 Like
article thumbnail
Hybrid Cloud Backup: A Comprehensive Guide To Securing Your Data
A guide to securing data through hybrid cloud backup, covering key concepts, security measures, implementation strategies, and best practices.
February 13, 2024
by Alex Tray
· 2,861 Views · 1 Like
article thumbnail
How to Onboard and Protect Remote Teams With Secure Cloud Environments
Secure cloud environments transform remote software development, aiding organizations with remote teams to onboard and manage them cost-effectively.
February 13, 2024
by Laurent Balmelli, PhD
· 2,197 Views · 2 Likes
article thumbnail
Designing for Security
Security should be a top priority in development and proper testing mechanisms should be implemented for both security and functionality.
February 13, 2024
by Pranav Kumar Chaudhary
· 2,115 Views · 1 Like
article thumbnail
Securing Your AWS RDS Instances: Best Practices and Examples
Securing your AWS RDS instances is crucial to protecting your data. This article explores best practices for securing AWS RDS instances, supported by practical examples.
February 13, 2024
by Vijay Panwar
· 2,455 Views · 1 Like
article thumbnail
Security Considerations in Kubernetes
In this comprehensive guide, we will explore the key security aspects of Kubernetes, including best practices and recommendations.
February 13, 2024
by Aditya Bhuyan
· 3,738 Views · 2 Likes
article thumbnail
Managing IoT Edge Devices at Scale: Device Lifecycle and Configuration Management
AI-driven device management in IoT uses ML for predictive maintenance, adaptive configs, anomaly detection, self-healing, and resource optimization.
February 12, 2024
by Deep Manishkumar Dave
· 3,449 Views · 1 Like
article thumbnail
Build a Digital Collectibles Portal Using Flow and Cadence (Part 1)
Understand more about the Flow blockchain and Cadence smart contract language by building a new website focused on collecting digital collectibles.
February 12, 2024
by John Vester DZone Core CORE
· 16,619 Views · 2 Likes
article thumbnail
VPN Log vs. Zero-Log Policy: A Comprehensive Analysis
Discover the impact on privacy and troubleshooting in our comprehensive analysis, guiding you to make informed choices for a secure online experience.
February 12, 2024
by Emmanuel Ohaba
· 1,869 Views · 2 Likes
article thumbnail
The Impact of Open-Source Software on Public Finance Management
Open-source software is revolutionizing public finance with cost-effective, transparent, and collaborative management solutions.
February 11, 2024
by Devin Partida
· 2,899 Views · 1 Like
article thumbnail
Combating Malware Threats
Understanding the diverse array of malware types is crucial for individuals, organizations, and cybersecurity professionals.
February 9, 2024
by Saurav Bhattacharya
· 3,999 Views · 1 Like
article thumbnail
Evolution of Privacy-Preserving AI: From Protocols to Practical Implementations
Let's examine the correlation between AI systems, machine learning, and the utilization of sensitive information.
February 9, 2024
by Petr Emelianov
· 17,251 Views · 36 Likes
article thumbnail
Securing the Keys to the Kingdom: Exploring the Depths of Privileged Access Management (PAM)
Discover how PAM, a key element of Zero Trust architecture, safeguards privileged access to secure sensitive information and prevent unauthorized access.
February 9, 2024
by Nitin Uttreja
· 5,886 Views · 1 Like
article thumbnail
Hardening Apache APISIX With the OWASP's Coraza and Core Ruleset
The OWASP regularly publishes a Top 10 vulnerability report. The report targets vulnerabilities in web applications. Here, learn how to fix some of them.
February 8, 2024
by Nicolas Fränkel DZone Core CORE
· 2,358 Views · 2 Likes
article thumbnail
Best Practices To Create Highly Secure Applications in Mule 4
In this blog, I would like to share a few best practices for creating highly secure applications in Mule 4 for all deployment options.
February 8, 2024
by PRAVEEN SUNDAR
· 2,891 Views · 1 Like
article thumbnail
Good Application Security Posture Requires Good Data
Application Security Posture Management, ASPM, is only as good as the data sources. Learn about the pitfalls and what to look for in tools and scanners.
February 8, 2024
by Dwayne McDaniel
· 2,422 Views · 1 Like
article thumbnail
A Comprehensive Guide To Achieving SOC 2 Compliance
In this blog post, we’ll define SOC 2 compliance and walk you through the various phases and processes you can follow to achieve it.
February 8, 2024
by Nitesh Saini
· 2,436 Views · 1 Like
article thumbnail
Unleashing the Power of WebAssembly to Herald a New Era in Web Development
Embark on a revolutionary journey in web development with our expertise in harnessing the transformative power of WebAssembly.
February 8, 2024
by Harris Anderson
· 5,594 Views · 6 Likes
  • Previous
  • ...
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: