DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Security Topics

article thumbnail
How Secure Cloud Development Replaces Virtual Desktop Infrastructures
Learn how secure cloud development environments provide a replacement for secure laptops and virtual desktop infrastructures for secure application development.
March 12, 2024
by Laurent Balmelli, PhD
· 4,491 Views · 2 Likes
article thumbnail
OWASP Top 10 Explained: SQL Injection
This post discusses SQL Injection (SQLi), its types, examples of breaches, and prevention methods to protect against this cybersecurity threat.
March 12, 2024
by Pier-Jean MALANDRINO DZone Core CORE
· 6,048 Views · 7 Likes
article thumbnail
When a Data Mesh Doesn’t Make Sense for Your Organization
Data mesh—including data mesh governance—requires the right mix of process, tooling, and internal resources. Find out what it takes to get data mesh-ready.
March 11, 2024
by Lior Gavish
· 2,784 Views · 1 Like
article thumbnail
Beyond the Call: AI and Machine Learning’s Role in Evolving Vishing Cyber Threats
The social engineering tactic of vishing is a growing problem; you must understand it first in order to properly defend yourself.
March 11, 2024
by Luis Maldonado
· 2,119 Views · 1 Like
article thumbnail
Seamless Integration: Connecting AWS Lambda to RDS and Writing Data Effortlessly
This comprehensive guide walks you through the process of setting up AWS Lambda to connect to an RDS instance and write data to tables, step-by-step.
March 9, 2024
by Vijay Panwar DZone Core CORE
· 6,202 Views · 1 Like
article thumbnail
Solix Empowers the Data-Driven Enterprise With Comprehensive Data Management and Integration Solutions
How Solix helps data-driven enterprises manage and integrate data to get more value for more people with less time and less money.
March 9, 2024
by Tom Smith DZone Core CORE
· 5,790 Views · 1 Like
article thumbnail
Introduction to Modern Data Stack
Exploring how the modern data stack revolutionizes data management with scalable cloud solutions, automated tools, and advanced analytics capabilities.
March 8, 2024
by Suhas Jangoan
· 4,668 Views · 5 Likes
article thumbnail
Setup With Pritunl
This documentation provides a guide to setting up a Virtual Private Network (VPN) server using Pritunl, a popular open-source VPN server management platform.
March 8, 2024
by Himanshu Bansal
· 4,913 Views · 3 Likes
article thumbnail
Mitigating Adversarial Attacks: Strategies for Safeguarding AI Systems
This article explores key strategies for mitigating adversarial manipulation and ensuring robust operations in real-world applications.
March 7, 2024
by Ramakrishnan Neelakandan
· 2,475 Views · 3 Likes
article thumbnail
Incident Management: Checklist, Tools, and Prevention
This article summarizes incident management and how to deal with and survive an outage that occurs in your software.
March 7, 2024
by Naga Santhosh Reddy Vootukuri DZone Core CORE
· 3,450 Views · 3 Likes
article thumbnail
How Blockchain Tech Can Improve DevOps Practices in Web3
Current DevOps tools and practices can help develop applications on top of blockchains, and a more mature blockchain adoption can improve the DevOps practices in return.
Updated March 7, 2024
by John Vester DZone Core CORE
· 71,880 Views · 2 Likes
article thumbnail
Decrypting the Future: Unveiling Questions on AI's Role in Cybersecurity
Do you know AI is revolutionizing digital defense, tackling key questions and implications for the industry? Get insights from experts.
March 6, 2024
by Chandan Saxena
· 2,009 Views · 2 Likes
article thumbnail
iOS Application Security for Beginners
This article provides a brief overview of techniques that can be used in your mobile iOS application to keep it secure enough for the vast majority of cases.
March 6, 2024
by Aleksei Pichukov
· 1,758 Views · 1 Like
article thumbnail
Cybersecurity in the Cloud: Integrating Continuous Security Testing Within DevSecOps
AI assisted cyberattacks against cloud infrastructure is a fast growing threat. Integrating CST within DevSecOps serves as a crucial weapon for organizations.
March 5, 2024
by Prithvish Kovelamudi
· 6,267 Views · 8 Likes
article thumbnail
Ensuring Security and Compliance: A Detailed Guide to Testing the OAuth 2.0 Authorization Flow in Python Web Applications
In this detailed guide, walk through building a simple OAuth 2.0 Authorization Server using Python 3 and the popular web framework, Flask.
March 5, 2024
by Vijay Panwar DZone Core CORE
· 3,149 Views · 1 Like
article thumbnail
Unpacking Our Findings From Assessing Numerous Infrastructures (Part 2)
Making superior performance accessible. Get better at assessing your core infrastructure needs, find out where engineering teams often falter.
March 5, 2024
by Komal J Prabhakar
· 3,745 Views · 2 Likes
article thumbnail
Secure Your API With These 16 Practices With Apache APISIX (Part 2)
Last week, we listed 16 practices to help secure one's APIs and described how to implement them with Apache APISIX. This week, we will look at the remaining practices.
March 4, 2024
by Nicolas Fränkel DZone Core CORE
· 2,061 Views · 1 Like
article thumbnail
Guarding the Gates of GenAI: Security Challenges in AI Evolution
This guide helps you understand the security challenges in GenAI Evolution and discusses robust measures to mitigate potential leaks, manipulation, and misuse.
March 4, 2024
by Phani Kumar Varma Kokkerlapati
· 2,444 Views · 3 Likes
article thumbnail
Integrating Software Supply Chains and DevOps: Tips for Effectively Reconciling Supply Chain Management and DevOps
Enacting visibility, input, and accountability for both the development and operations teams ensures secure SSCs and provides an opportunity to strengthen DevOps culture.
March 3, 2024
by Justin Albano DZone Core CORE
· 7,690 Views · 1 Like
article thumbnail
Maximizing Feedback for Developers With Continuous Testing
Maximize software development feedback with continuous testing, incorporating multiple loops and Deming's philosophy. Enhance code quality and security.
March 1, 2024
by Mike Harris
· 6,009 Views · 1 Like
  • Previous
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: