DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Security Topics

article thumbnail
The Hidden Dangers of Bidirectional Characters
Security risks and solutions in modern computing! Discover the hidden dangers of bidirectional control characters and learn how to protect your system!
May 22, 2024
by Sven Ruppert DZone Core CORE
· 839 Views · 2 Likes
article thumbnail
Securing Generative AI Applications
There are various types of security considerations needed to ensure the safety of a Gen AI application and the uptime of the application.
May 22, 2024
by Pranav Kumar Chaudhary
· 1,468 Views · 1 Like
article thumbnail
Tackling Records in Spring Boot
Let’s take a look at several scenarios where Java records can help us increase readability and expressiveness by squeezing the homologous code.
May 21, 2024
by Anghel Leonard DZone Core CORE
· 3,406 Views · 5 Likes
article thumbnail
Navigating the Path to Digital Maturity: Key Takeaways From the ManageEngine User Conference
Insights from the ManageEngine User Conference: Pursuing digital maturity, optimizing digital impact, and enhancing cybersecurity in the modern enterprise.
May 21, 2024
by Tom Smith DZone Core CORE
· 373 Views · 1 Like
article thumbnail
Rediscovering DevOps’ Heartbeat With Secure Cloud Development Environments
How to rethink the implementation of the core DevOps principles of flow, feedback, and continuous learning using secure cloud development environments.
May 21, 2024
by Laurent Balmelli, PhD
· 442 Views · 2 Likes
article thumbnail
GitHub RepoJacking: Are You Sure Your GitHub Is Safe?
Can you be sure that your GitHub isn’t vulnerable to an attack called RepoJacking? This alarming thread in the cybersecurity world is gaining more and more concern.
May 20, 2024
by Daria Kulikova
· 705 Views · 2 Likes
article thumbnail
AI Risk Management Framework: A Technical Deep Dive for AI Developers
AI Risk Management Framework guides developers to build AI systems by identifying and mitigating risks through testing, secure coding, and continuous monitoring.
May 20, 2024
by Ramakrishnan Neelakandan
· 1,155 Views · 3 Likes
article thumbnail
HTTP API: Key Skills for Smooth Integration and Operation, Part 2
Explore how data handling concepts apply in real-world scenarios as well as the importance of these skills, instrumental in ensuring project stability.
May 20, 2024
by Filipp Shcherbanich
· 589 Views · 2 Likes
article thumbnail
Harnessing the Power of AI in Compliance Automation: Insights from Shrav Mehta, Founder and CEO, Secureframe
Discover how AI transforms compliance automation, its challenges, and best practices for developers, engineers, and architects.
May 20, 2024
by Tom Smith DZone Core CORE
· 423 Views · 1 Like
article thumbnail
10 Misconceptions About Passkey Implementation: It’s Harder Than You Think!
Read about the challenges, pitfalls, and misconceptions you will face while implementing passkey-first authentication on your own.
May 17, 2024
by Vincent Delitz
· 862 Views · 5 Likes
article thumbnail
Create Proxy Application for Mule APIs
In this article, we will learn what a proxy is and discuss how to configure a proxy application for the MuleSoft Application using API Manager in the Anypoint Platform.
May 16, 2024
by Vidya Bogaram
· 615 Views · 1 Like
article thumbnail
From Novice to Expert: Building Robust Security With Kubernetes RBAC
Master Kubernetes security with this guide on RBAC, covering everything from basic roles and permissions to cluster protection.
May 14, 2024
by Rajesh Gheware
· 1,079 Views · 2 Likes
article thumbnail
How You Can Use Logs To Feed Security
Learn how to leverage logs with tools and AI to enhance security, detect threats, manage costs, and capture all your data for proactive threat prevention.
May 14, 2024
by Alvin Lee DZone Core CORE
· 3,061 Views · 2 Likes
article thumbnail
Ransomware, Threat, and Detection Methods
Ransomware is a significant cyber threat, with encryption tech, cyber currency, and easy access fueling its growth. Let's protect against attacks.
May 13, 2024
by Yusuf Tezcan
· 865 Views · 1 Like
article thumbnail
Engineering Trustworthy AI: A Deep Dive Into Security and Safety for Software Developers
Building truly intelligent systems isn't enough; we must prioritize security and safety to ensure these innovations benefit humanity without causing harm.
May 13, 2024
by Ramakrishnan Neelakandan
· 912 Views · 3 Likes
article thumbnail
Securing Development: Key Differences in Virtual Desktops, Enterprise Browsers and Cloud-Based Development
Which technology to secure development? Check the top differences between virtual desktops, enterprise browsers, and secure cloud development environments.
May 10, 2024
by Laurent Balmelli, PhD
· 936 Views · 2 Likes
article thumbnail
AI-Genetic Algorithm in Malware Detection
Genetic algorithms can evolve signatures and detection patterns for identifying malware and malicious code within large datasets.
May 10, 2024
by Madhusudhan Dasari
· 1,235 Views · 2 Likes
article thumbnail
Lessons On Secrets Security From Datadog Research
Explore security findings from Datadog's research into recent attacks, highlighting two sophisticated attack methods and vital lessons in secret security.
May 9, 2024
by Dwayne McDaniel
· 1,204 Views · 1 Like
article thumbnail
Securing Secrets: A Guide To Implementing Secrets Management in DevSecOps Pipelines
Secure secrets management in DevSecOps is crucial to prevent breaches. Implement best practices, automate rotation, and use tools for robust security.
May 9, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 3,359 Views · 6 Likes
article thumbnail
Is RBAC Still Relevant in 2024?
Explore the state of Role-Based Access Control (RBAC), why and how developers should use it, and what are the best practices to implement it in applications.
May 7, 2024
by Gabriel L. Manor
· 575 Views · 2 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: