DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Security Topics

article thumbnail
Why Choose Bug Bounty Programs? (Benefits and Challenges Explained)
Bug Bounty programs can help effectively identify and mitigate vulnerabilities when combined with secure development practices and proper vulnerability management.
June 10, 2024
by Alex Vakulov
· 1,998 Views · 2 Likes
article thumbnail
Analysis of Flubot Malware on Android OS
Explore research that focuses on the possible methods of Flubot malware's signature, behavior, and future strikes.
June 10, 2024
by Priyank Singh
· 2,766 Views · 1 Like
article thumbnail
Embracing Responsible AI: Principles and Practices
This article provides context on embracing responsible AI along with guidelines for developing AI systems that are transparent, responsible, and lasting.
June 7, 2024
by Naga Santhosh Reddy Vootukuri DZone Core CORE
· 2,268 Views · 3 Likes
article thumbnail
Mocking Dependencies and AI Is the Next Frontier in Vue.js Testing
Mocking dependencies in Vue.js tests is crucial for isolating components, and ensures reliable, efficient, and comprehensive testing in controlled environments.
June 6, 2024
by Anton Lucanus DZone Core CORE
· 4,215 Views · 1 Like
article thumbnail
Dependency Injection
One of the foundational techniques in Java backend development, helping build resilient and scalable applications tailored to modern software demands.
June 5, 2024
by German Urikh
· 6,124 Views · 3 Likes
article thumbnail
Protecting PII Data With JWT
Use JWT tokens for fine-grained access control while avoiding direct inclusion of PII-like account numbers. Use non-PII identifiers and perform server-side lookup.
June 5, 2024
by Abhishek Goswami
· 2,423 Views · 2 Likes
article thumbnail
Security Considerations When Building SaaS
This article briefly talks about the different models of providing tenant isolation and then delves into the security considerations of building a SaaS.
June 4, 2024
by Mayank Singhi
· 2,242 Views · 1 Like
article thumbnail
New Ways for CNAPP to Shift Left and Shield Right: The Technology Trends That Will Allow CNAPP to Address More Extensive Threat Models
Because of the evolving threat landscape and complexity of modern organizations, the evolution of the CNAPP model yields both significant challenges and opportunities.
June 4, 2024
by Laurent Balmelli, PhD
· 2,602 Views · 1 Like
article thumbnail
Enhancing Vehicle Routing Problems With Deep Reinforcement Learning and Metaheuristics
Combining machine learning methods and traditional optimization techniques for logistics and fleet management execution optimizations.
June 3, 2024
by Sumit Mittal
· 3,030 Views · 2 Likes
article thumbnail
Elevating Defense Precision With AI-Powered Threat Triage in Proactive Dynamic Security
This article sheds light on how artificial intelligence and cybersecurity converge to revolutionize threat detection, incident response, and vulnerability management.
May 31, 2024
by Chinelo Okonkwo
· 2,128 Views · 2 Likes
article thumbnail
Strengthening Cloud Environments Through Python and SQL Integration
Improve cloud environment security with SQL, automating resource management and access control, and Python, managing anomaly detection and real-time monitoring.
May 31, 2024
by Rajesh Remala
· 3,032 Views · 5 Likes
article thumbnail
Using Cron Jobs With Encrypted Home Folders and Malware Protection on Linux
This article explores the implications and solutions for running cron jobs in environments with encrypted home directories and malware scanners.
May 28, 2024
by Constantin Kwiatkowski
· 2,208 Views · 2 Likes
article thumbnail
Less Time Learning, More Time Building
Secure cloud adoption no longer requires an investment in proprietary cloud infra knowledge, allowing teams to implement security that aligns with the business.
May 27, 2024
by John Vester DZone Core CORE
· 22,617 Views · 2 Likes
article thumbnail
Securing the OSS Supply Chain: Best Practices and Real-World Examples
OSS empowers tech with cost efficiency and agility but faces supply chain security risks; this article delves into real-world examples and preventive measures.
May 27, 2024
by Suryaprakash nalluri
· 705 Views · 2 Likes
article thumbnail
How To Protect Node.js Form Uploads With a Deterministic Threat Detection API
Learn more about the prevalence of custom file upload forms in web applications and a deterministic threat detection solution for Node.js form uploads.
May 24, 2024
by Brian O'Neill DZone Core CORE
· 1,763 Views · 2 Likes
article thumbnail
How To Protect a File Server
To secure a Linux file server, apply a Defense in Depth approach. Always remember that security is a continuous process, not a one-time task.
May 24, 2024
by Akanksha Pathak DZone Core CORE
· 1,692 Views · 3 Likes
article thumbnail
Constructing Secure and Strong Data Access Layers With JPA
Determine how to control JPA features and secure coding practices to build secure data access layers that protect sensitive information in your applications.
May 23, 2024
by Humashankar Vellathur Jaganathan
· 3,138 Views · 3 Likes
article thumbnail
Key Benefits of Integrating Password Managers Into Kubernetes Security
Integrating password managers into Kubernetes centralizes credentials, enhances security, automates rotations, and improves compliance.
May 23, 2024
by Favour Efeoghene
· 1,175 Views · 1 Like
article thumbnail
Fine-Grained Access Control for Stored Procedures
This article presents a flexible approach to securing your stored procedures using a programmable database proxy. Read more!
May 23, 2024
by Max Tardiveau
· 705 Views · 1 Like
article thumbnail
Hexagonal Architecture in the Frontend: A Real Case
Discover why hexagonal architecture, decoupling, and dependency injection can be very useful in the front end.
May 22, 2024
by Sergio Carracedo
· 3,627 Views · 3 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: