DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

The Latest Security Topics

article thumbnail
Repository and Metadata Backup, Disaster Recovery, And Compliance: The Unbreakable Trio
Read the article and learn why Compliance, DevOps backup, and Disaster Recovery go together and how this trio can help you ensure the fortress of your digital assets.
January 25, 2024
by Daria Kulikova
· 2,083 Views · 2 Likes
article thumbnail
Comprehensive Gun Detection for Schools: An AI-Based Approach Leveraging Audio and Video Insights
The focus is on identifying guns visually and discerning gun-related sounds, creating a comprehensive system for threat detection.
January 25, 2024
by shiva kumar sriramulugari
· 5,176 Views · 2 Likes
article thumbnail
Building Secure Cloud Applications: A Developer’s Companion to NIST CSF
A developer's guide to building a secure cloud environment with the NIST Cybersecurity Framework.
January 23, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 1,909 Views · 2 Likes
article thumbnail
Unraveling the Wonders of Bluetooth: Connecting the World Wirelessly
This expanded article dives deeper into Bluetooth's various applications, security aspects, its role in healthcare and industry, and its promising future.
January 22, 2024
by Aditya Bhuyan
· 1,938 Views · 2 Likes
article thumbnail
Maven Dependency Scope Applied
Learn how to use Maven's dependency scope to adhere to the chosen architecture in a multi-module project.
January 22, 2024
by Maksim Kren
· 3,329 Views · 2 Likes
article thumbnail
Building Decentralized Applications With Node.js and Web 3.0
In the rapidly evolving landscape of web development, Web 3.0 represents a paradigm shift towards a more decentralized, user-empowering internet.
January 22, 2024
by Nilesh Savani
· 3,657 Views · 3 Likes
article thumbnail
Private Cloud's Deployment
Software architecture to perform automated IAAS, PAAS, and SAAS deployments to private cloud with compliance, data privacy, and security.
January 22, 2024
by Joel Lopes
· 2,469 Views · 2 Likes
article thumbnail
The Need for Secure Cloud Development Environments
Understand the need for secure Cloud Development Environments (CDEs) when onboarding developers quickly and securely in global development organizations.
January 22, 2024
by Laurent Balmelli, PhD
· 3,838 Views · 6 Likes
article thumbnail
Protecting Your Digital Realm: Understanding Cybersecurity Threats and Defenses
Here's an expanded article on cybersecurity defense strategies, elaborating on various approaches, methods, and tools used to mitigate cyber threats and bolster digital defenses.
January 21, 2024
by Aditya Bhuyan
· 2,222 Views · 2 Likes
article thumbnail
How to Build a Data Foundation for Generative AI
GenAI depends on data maturity, in which an organization demonstrates mastery over both integrating data (moving and transforming it) and governing its use.
January 19, 2024
by Charles Wang
· 3,893 Views · 3 Likes
article thumbnail
How to Use Pen Tests to Protect Your Company From Digital Threats
In this article, take a deep dive into penetration testing, the effective method for conducting an information security audit.
January 19, 2024
by Alex Vakulov
· 4,085 Views · 1 Like
article thumbnail
Threat Modeling: Navigating Cybersecurity Challenges
This analysis delves into the intricacies of threat modeling, exploring its mechanisms, methodologies, real-world applications, benefits, and challenges.
January 19, 2024
by Kellyn Gorman DZone Core CORE
· 3,162 Views · 1 Like
article thumbnail
Database Security: Best Practices and What You Need to Know
In this article, gain an understanding as to how implementing database security best practices is not just a technical necessity but a business imperative.
January 19, 2024
by Kellyn Gorman DZone Core CORE
· 3,710 Views · 4 Likes
article thumbnail
Secure Spring REST With Spring Security and OAuth2
In this tutorial, learn how to add security mechanisms, such as an authorization process and access tokens, to your REST API with Spring Security and OAuth2.
Updated January 19, 2024
by Adam Zaręba
· 350,904 Views · 90 Likes
article thumbnail
Securing Digital Frontiers: The Essential Role of Network Access Control in Modern Cybersecurity
Network Access Control is key in barring unauthorized entries, improving network visibility, enhancing cybersecurity readiness, and aligns with the Zero Trust approach.
January 19, 2024
by Nitin Uttreja
· 3,530 Views · 1 Like
article thumbnail
Protecting Privacy in the Age of Edge AI: The Role of Homomorphic Encryption
Homomorphic Encryption secures data in Edge AI, ensuring privacy. Rising IoT and privacy concerns drive Edge AI growth, aided by tech giants' privacy-centric approaches.
January 19, 2024
by Deep Manishkumar Dave
· 3,529 Views · 2 Likes
article thumbnail
Securing Applications in ROKS Cluster
Ensure heightened security for applications in the ROKS Cluster by employing Istio Egress Gateway and routing through edge nodes for an added layer of protection.
January 19, 2024
by Pradeep Gopalgowda
· 4,155 Views · 3 Likes
article thumbnail
Revolutionizing Kubernetes With K8sGPT: A Deep Dive Into AI-Driven Insights
Harness the power of AI-driven insights to oversee and manage Kubernetes clusters for optimal performance effectively.
January 19, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 5,649 Views · 7 Likes
article thumbnail
What Do You Need To Know About DevOps Lifecycle Phases?
DevOps lifecycle involves planning, development, testing, deployment, monitoring, and feedback for seamless integration between teams.
January 19, 2024
by Batista Dave
· 3,376 Views · 2 Likes
article thumbnail
Unleashing the Power of OAuth Authentication in Computing
In this comprehensive article, we delve deep into the world of OAuth authentication in computing, exploring its concepts, applications, key components, and the impact it holds for the future of secure access control.
January 19, 2024
by Aditya Bhuyan
· 3,489 Views · 3 Likes
  • Previous
  • ...
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: