DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Security Topics

article thumbnail
Data Governance: Data Integration (Part 4)
It's important to have a strong data governance framework in place when integrating data from different source systems. Learn more!
June 27, 2024
by Sukanya Konatam
· 10,086 Views · 1 Like
article thumbnail
Shortened Links, Big Risks: Unveiling Security Flaws in URL Shortening Services
In this article, we explore the security vulnerabilities of URL-shortening services and identify top threats using the OWASP top 10 framework.
June 26, 2024
by Gaurav Puri
· 2,111 Views · 4 Likes
article thumbnail
The XZ Utils Backdoor in Linux: A Symptom of Ailing Security in the Software Supply Chain
The reliance on community volunteers to maintain critical systems is widely documented, yet it leaves potential for extreme risk in the software supply chain.
June 26, 2024
by Pieter Danhieux
· 2,051 Views · 1 Like
article thumbnail
Cybersecurity Essentials for Software Developers
Boost your software security: stay updated, use secure coding, implement strong authentication, test rigorously, and stay informed on cyber threats.
June 25, 2024
by kunal vaja
· 1,971 Views · 2 Likes
article thumbnail
Index Engines’ Cybersense Delivers Unparalleled Ransomware Detection With 99.99% Accuracy
Index Engines announces an industry-first 99.99% SLA for CyberSense to accurately detect ransomware corruption, empowering organizations with smarter recovery strategies.
June 25, 2024
by Tom Smith DZone Core CORE
· 1,731 Views · 1 Like
article thumbnail
Comprehensive Guide To Troubleshooting IPsec VPN Site-To-Site Connections With PSK on FortiGate Firewalls
Here’s a structured approach to diagnose and resolve common IPsec VPN problems between two sites: "Headquarter" and "Branch".
June 24, 2024
by Sanjay Poddar
· 1,906 Views · 1 Like
article thumbnail
The Role of Kubernetes in Data Privacy and Protection
Kubernetes boosts data privacy and protection with secure container management, encryption, and access controls, ensuring safe data handling in modern applications.
June 20, 2024
by Michael Chukwube
· 5,297 Views · 2 Likes
article thumbnail
Optimizing Your Cloud Resources, Part 1: Strategies for Effective Management
In this article, explore options to optimize your cloud resources to enhance performance, reduce costs, and improve efficiency.
June 20, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 4,489 Views · 4 Likes
article thumbnail
IoT Needs To Get Serious About Security
Security issues in IoT have gotten worse, not better, and it's time we acknowledge that and fix it. It's long past time.
June 20, 2024
by David G. Simmons DZone Core CORE
· 5,191 Views · 2 Likes
article thumbnail
Transforming Modern Networking: The Unmatched Security of Secure Access Service Edge (SASE)
Secure Access Service Edge (SASE) enhances security by converging network and security services into a single, cloud-native architecture.
June 19, 2024
by Sanjay Poddar
· 2,134 Views · 2 Likes
article thumbnail
A Wake-up Call for Cloud Security: Insights From the Recent Snowflake Data Breach
A case study on the recent Snowflake data breach and deep dive into cloud security measures to fortify cloud environments.
June 19, 2024
by Venkata Nedunoori
· 2,495 Views · 1 Like
article thumbnail
Building Resilient Security Systems: Composable Security
The concept of composable security involves the integration of cybersecurity controls into architectural patterns, which are then implemented at a modular level.
June 18, 2024
by Deepa Ajish
· 2,398 Views · 2 Likes
article thumbnail
Unmasking the Danger: 10 Ways AI Can Go Rogue (And How to Spot Them)
Large language models pose risks like manipulation, cyberattacks, and unintended self-improvement, but safeguards are being developed.
June 18, 2024
by Indrajit Bhattacharya
· 1,871 Views · 1 Like
article thumbnail
Building an Internal TLS and SSL Certificate Monitoring Agent: From Concept to Deployment
Learn how an internal SSL/TLS certificate monitoring agent was built, including requirements, architecture, scheduling, integrations, and UI.
June 14, 2024
by Max Shash DZone Core CORE
· 6,944 Views · 4 Likes
article thumbnail
How Sigma Is Empowering Devs, Engineers, and Architects With Cloud-Native Analytics
Sigma CEO Mike Palmer reveals how the company's cloud-native platform is transforming data analytics for developers, engineers, and architects.
June 13, 2024
by Tom Smith DZone Core CORE
· 3,758 Views · 1 Like
article thumbnail
Securing the Future: The Role of Post-Quantum Cryptography
Learn how advances in quantum computing are revolutionizing computer capacities and computation times, but threatening current cryptographic systems.
June 13, 2024
by Frederic Jacquet DZone Core CORE
· 3,338 Views · 3 Likes
article thumbnail
Effortless Credential Management in Azure: The Power of Managed Identities
Managed Identities simplify access to Azure resources, eliminating the need for connection strings and manual rotation of secrets.
June 13, 2024
by Siri Varma Vegiraju
· 3,543 Views · 1 Like
article thumbnail
Exploring the Role of Data Analytics in SOC Alert Tuning
Learn how Security Operations Centers (SOCs) use data analytics and AI to strengthen cybersecurity defenses against malefactors.
June 13, 2024
by Anastasios Arampatzis
· 2,370 Views · 1 Like
article thumbnail
Smart Network Onboarding: Revolutionizing Connectivity With AI and Automation
By integrating AI and automation, organizations can anticipate and mitigate connectivity issues, customize onboarding procedures, and enforce security standards.
June 11, 2024
by Raghavaiah Avula
· 2,958 Views · 1 Like
article thumbnail
Revolutionizing API Security in the Era of GenAI: An Architect’s Perspective
AI-powered API security solutions are crucial for addressing the challenges posed by GenAI, providing comprehensive visibility, and proactive governance.
June 11, 2024
by Vaibhav Malik
· 2,362 Views · 1 Like
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: