DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

The Latest Security Topics

article thumbnail
SIEM Volume Spike Alerts Using ML
This article covers a brief introduction to SIEM, data engineering problems in log collection, and solutions using the ML approach.
January 31, 2024
by Madhusudhan Dasari
· 2,241 Views · 2 Likes
article thumbnail
Pinterest's Transition to HTTP/3: A Boost in Performance and Reliability
Pinterest's adoption of HTTP/3 is a strategic move to enhance the platform's networking performance. It also helps to leverage the protocol's advanced features.
January 31, 2024
by Roopa Kushtagi
· 2,131 Views · 1 Like
article thumbnail
Rethinking Data Governance: Metrics for Meaningful Outcomes
Data governance has been obsessed with a metric that feels more like accounting than strategic decision-making: coverage. The problem? Coverage misses the mark.
January 30, 2024
by Kirit Basu
· 2,042 Views · 2 Likes
article thumbnail
Device and Data Security in Embedded Systems
Securing embedded systems is a major concern with the increase in connected devices. Explore what makes them vulnerable.
January 30, 2024
by Ambuj Nandanwar
· 1,905 Views · 1 Like
article thumbnail
NFT Wallets Unleashed: A Data Structures and Application Design Journey
Exploring world of NFTs and blockchain while prototyping wallet CLI application with efficient data structures using C# and .NET Core.
January 30, 2024
by Anton Yarkov DZone Core CORE
· 2,094 Views · 1 Like
article thumbnail
Edge Security for IoT: Protecting Data at the Edge
In the world of IoT, edge security is crucial. This article explores the unique security challenges and strategies for safeguarding IoT data and devices at the edge.
January 29, 2024
by Deep Manishkumar Dave
· 2,277 Views · 1 Like
article thumbnail
Data Governance and DevOps
This article talks about data governance processes and its importance and how a DevOps mindset can improve its efficiency.
January 29, 2024
by Yashraj Behera
· 2,102 Views · 1 Like
article thumbnail
Simplifying Access: The Role of Single Sign-On (SSO) in Cloud Computing
In this article, we will explore the vital role of SSO in cloud computing, its benefits, key components, implementation, challenges, and the future of secure access management.
January 28, 2024
by Aditya Bhuyan
· 2,551 Views · 2 Likes
article thumbnail
TPM Chips and the Use of TPM in Virtualization Technology
In this article, we will explore TPM chips, their functions, and how they are utilized in virtualization technology.
January 27, 2024
by Aditya Bhuyan
· 3,264 Views · 2 Likes
article thumbnail
Securing the Digital Frontier
This article delves into data protection, privacy, and the latest trends in technology and security.
January 27, 2024
by Saurav Bhattacharya
· 3,818 Views · 3 Likes
article thumbnail
How To Implement Supply Chain Security in Your Organization
This article seeks to unravel the complexities of supply chain security, presenting a clear and detailed exposition of its significance and vulnerabilities.
January 26, 2024
by Kellyn Gorman DZone Core CORE
· 3,017 Views · 1 Like
article thumbnail
Container Security: The Art and Science of Safeguarding Cloud-Native Environments
Delve into a spectrum of crucial security patterns and anti-patterns to best navigate the ever-evolving and highly popular realm of containers.
Updated January 26, 2024
by Pratik Prakash DZone Core CORE
· 2,515 Views · 1 Like
article thumbnail
Build an OAuth 2.0 Authorization Server With Spring Boot and Spring Security
Check out this tutorial to learn how to build an OAuth 2.0 authorization server with Spring Boot and Spring Security.
Updated January 26, 2024
by Andrew Hughes
· 140,355 Views · 12 Likes
article thumbnail
API Security: Best Practices and Patterns To Securing APIs
In this article, explore how securing APIs is not a one-time task but a continuous endeavor that requires constant vigilance and adaptation to emerging threats.
January 26, 2024
by Kellyn Gorman DZone Core CORE
· 4,633 Views · 5 Likes
article thumbnail
Authorization Code Grant Flow With Spring Security OAuth 2.0
In this tutorial, learn how to implement a Spring authorization server using Spring Security OAuth2.
Updated January 26, 2024
by Amit Mishra DZone Core CORE
· 27,269 Views · 2 Likes
article thumbnail
Spring Security Authentication
Security is one of the most vital concerns for any organization. In this article, you will learn about authentication and how to integrate them with Spring MVC.
Updated January 26, 2024
by Mohamed Labouardy
· 178,994 Views · 28 Likes
article thumbnail
A Framework for Maintaining Code Security With AI Coding Assistants
Learn more on how implementing the right framework, software developers can select and use AI coding tools without introducing serious security flaws in their software.
January 26, 2024
by Philip Piletic DZone Core CORE
· 4,113 Views · 4 Likes
article thumbnail
Safeguarding Privacy: A Developer's Guide to Detecting and Redacting PII With AI-Based Solutions
Navigating Personally Identifiable Information (PII) protection through AI-powered solutions for effective detection and redaction.
January 25, 2024
by Mahmud Adeleye
· 13,543 Views · 2 Likes
article thumbnail
Securing the Digital Frontline: Advanced Cybersecurity Strategies for Modern Web Development
In today's digital era, where the internet has become an integral part of our lives, the significance of cybersecurity in web development cannot be overstated.
January 25, 2024
by Nilesh Savani
· 2,275 Views · 2 Likes
article thumbnail
Monitoring Dynamic Linker Hijacking With eBPF
The article showcases using eBPF for detecting Dynamic Linker Hijacking in Linux by monitoring changes to the /etc/ld.so.preload file.
January 25, 2024
by Efim Rovaev
· 7,175 Views · 2 Likes
  • Previous
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: