DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

Avatar

Zac Amos

Features Editor at ReHack

Joined Sep 2022

Stats

Reputation: 973
Pageviews: 127.6K
Articles: 36
Comments: 0
  • Articles

Articles

article thumbnail
How To Implement a Patch Management Process
Implementing a patch management process can help address known vulnerabilities. Follow these best practices and implementation steps for good patch management.
March 28, 2024
· 791 Views · 1 Like
article thumbnail
Remote Work Security Tips for Developers
Best practices for remote work security for developers include creating office setup standards, requiring cybersecurity training, providing immediate support, and more.
March 21, 2024
· 3,046 Views · 1 Like
article thumbnail
Four Common CI/CD Pipeline Vulnerabilities
The continuous integration/continuous delivery (CI/CD) pipeline can contain numerous vulnerabilities for hackers to exploit. Here's how to address them.
March 14, 2024
· 3,296 Views · 1 Like
article thumbnail
Here's Why Developers Quit Their Jobs
Developers most often quit for culture issues, sub-par compensation, or stress and burnout. Here's how you can address each issue.
February 27, 2024
· 2,147 Views · 1 Like
article thumbnail
SSD vs. HDD: How the Choice of Storage Affects Developer Workflows
As a software developer, your computer's performance can significantly impact your work. Are HDDs or SSDs better for your workflow?
February 13, 2024
· 1,778 Views · 1 Like
article thumbnail
What Is Compliance Monitoring for Remote Developers?
Compliance monitoring helps ensure remote developers follow the rules and regulations set forth by companies and the industry. Here are a few monitoring measures.
January 15, 2024
· 2,939 Views · 2 Likes
article thumbnail
Why We Need Cybersecurity Whistleblowers
Whistleblowers are controversial, but they're essential for cybersecurity by helping protect customers, raising security standards, and promoting security awareness.
January 11, 2024
· 2,182 Views · 2 Likes
article thumbnail
7 Tips for Effective Cybersecurity Training for Developers
Cybersecurity training is crucial for modern developers, so organizations should prioritize learning to keep up with a constantly evolving digital business environment.
January 10, 2024
· 3,072 Views · 1 Like
article thumbnail
How To Protect RDP From Ransomware Attacks
Remote desktop protocol (RDP) is highly convenient — and highly vulnerable. Here are a few ways to secure your RDP against ransomware attacks.
December 19, 2023
· 2,368 Views · 1 Like
article thumbnail
Does Your App Accept Digital Wallets?
Mobile and online wallets offer convenient and secure ways to handle finances digitally. Here's what you need to know about accepting digital wallets in your mobile app.
December 12, 2023
· 2,327 Views · 2 Likes
article thumbnail
5 Best Practices for Secure Payment Processing in Applications
Build a trustworthy payment system for your app by taking the right precautions: using MFA, following PCI DSS guidelines, integrating fraud detection tools, and more.
November 17, 2023
· 2,813 Views · 1 Like
article thumbnail
How to Design and Implement Automated Security Workflows
Automated security workflows bring speed, consistency, and precision to once-tedious tasks. Here's how to design, implement, and maintain these workflows.
November 9, 2023
· 2,437 Views · 1 Like
article thumbnail
7 Essential Security Features for Messaging Apps to Gain User Trust
A successful messaging app relies on user trust in your security. Here are a few in-app features developers can implement to maximize trust and privacy.
October 25, 2023
· 1,637 Views · 1 Like
article thumbnail
How to Design Software to Reduce Breaches Caused by Human Error
Human error is a leading cause of data breaches, but software developers can help change that. Here are some design tips to make human error less likely.
October 19, 2023
· 4,045 Views · 3 Likes
article thumbnail
UX Is Critical for Zero-Trust
Systems with weak security can be attacked, but websites with UX issues can lose users. Designers should aspire to meet user needs while complying with safety standards.
September 15, 2023
· 2,579 Views · 1 Like
article thumbnail
How to Implement Deception Technology
Deception technology is a cybersecurity tactic that sets traps for intruders with fabricated versions of valuable assets. Here are the best practices for implementation.
August 12, 2023
· 3,656 Views · 1 Like
article thumbnail
How Does GDPR Impact the App Development Workflow?
GDPR's impact on data privacy has been well-documented, but how does the regulation impact the actual development process?
June 18, 2023
· 4,447 Views · 2 Likes
article thumbnail
How To Conduct a Secure Code Review
Secure code reviews are crucial for building applications that protect users, developers, and data. Here's everything you need to know to conduct one.
May 18, 2023
· 2,371 Views · 1 Like
article thumbnail
How Virtualization Helps Security
Virtualization allows you to create servers, storage devices, and networks all in virtual space — here's why that's beneficial for cybersecurity.
May 16, 2023
· 2,488 Views · 1 Like
article thumbnail
5 Best Practices for Data Warehousing
Getting started in data warehousing is a major undertaking, so it's important to consider a few best practices when beginning.
May 15, 2023
· 3,742 Views · 1 Like
article thumbnail
Benefits of Manual Penetration Testing
While automated pen testing has perks, manual pen testing is still beneficial. Manual pen testers can rely on hard-earned experience, prevent false positives, and more.
April 26, 2023
· 2,509 Views · 1 Like
article thumbnail
What To Know Before Implementing IIoT
Industrial Internet of Things (IIoT) technology offers many benefits for manufacturers to improve operations. Here’s what to consider before implementation.
March 17, 2023
· 4,507 Views · 1 Like
article thumbnail
5 Common Firewall Misconfigurations and How to Address Them
Properly setting up your firewall can reduce the likelihood of data breaches. A few common firewall misconfigurations to watch for are mismatched authentication standards, open policy configurations, non-compliant services, unmonitored log output, and incorrect test systems data.
March 16, 2023
· 2,480 Views · 1 Like
article thumbnail
AI Facial Recognition: How Does It Work?
Facial recognition is an increasing part of our world today, and it often uses artificial intelligence. But how does AI facial recognition actually work?
March 8, 2023
· 3,549 Views · 1 Like
article thumbnail
How Backdoor Attacks Facilitate Data Poisoning in Machine Learning
Data poisoning facilitated by backdoor access can skew machine learning data without detection. Here are some tips to protect against backdoor data poisoning.
February 21, 2023
· 2,931 Views · 1 Like
article thumbnail
How To Reduce the Impact of a Cloud Outage
Cloud outages can be inconvenient, but by preparing for them, you can reduce their negative impacts. This article includes five crucial steps to prepare.
February 16, 2023
· 3,372 Views · 1 Like
article thumbnail
Which Type of MFA Is Most Secure?
When implementing multi-factor authentication, we face many options: social media login, email code confirmation, text SMS confirmation, authentication apps, and biometric authentication. While each method has advantages and drawbacks, the most secure type of MFA to implement is often authentication apps.
February 10, 2023
· 3,092 Views · 1 Like
article thumbnail
Are Your Password Management Practices up to Par?
Passwords are a fact of modern business but often aren't managed well. Here are some tips for creating a business culture conscious of password security.
January 17, 2023
· 2,590 Views · 1 Like
article thumbnail
What Are BitB Phishing Attacks?
A browser-in-the-browser (BitB) attack involves a replica of a single sign-on (SSO) authentication window popping up. It can be hard to spot, but you can take measures to protect against BitB scams.
January 14, 2023
· 6,585 Views · 1 Like
article thumbnail
Should You Create Your Own E-Signature API?
E-signatures have many benefits, such as higher security. An e-signature API can make the signing experience much easier, but what's the best way to implement it: buying an API or building one?
January 12, 2023
· 4,233 Views · 1 Like

User has been successfully modified

Failed to modify user

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: