DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Security Topics

article thumbnail
How Can NIST 800-171 Policy Templates Improve CyberSecurity
Policy templates can streamline this process as you can improve security and achieve compliance more easily. Find out more in this guide!
April 23, 2024
by Stylianos Kampakis
· 731 Views · 1 Like
article thumbnail
High-Volume Security Analytics: Splunk vs. Flink for Rule-Based Incident Detection
Explore the strengths and weaknesses of Splunk and Flink to make informed decisions about how to best respond to security threats.
April 23, 2024
by Mayank Singhi
· 2,270 Views · 3 Likes
article thumbnail
How To Conduct Security Audits on Legacy Software
Most companies relying on legacy software cannot immediately stop using it. To determine how to best mitigate risk, follow these security audit steps.
April 22, 2024
by Zac Amos
· 399 Views · 1 Like
article thumbnail
Guide to Cloud-Native Application Security
Securing cloud-based applications through application security involves utilizing platforms such as Docker and Kubernetes to safeguard against threats.
April 19, 2024
by Naga Santhosh Reddy Vootukuri DZone Core CORE
· 1,373 Views · 3 Likes
article thumbnail
Beyond the Resume: Practical Interview Techniques for Hiring Great DevSecOps Engineers
This article offers advice for hiring managers, particularly in DevSecOps, on how to spot qualified candidates and avoid those who exaggerate their skills.
April 18, 2024
by Roman Burdiuzha
· 3,849 Views · 3 Likes
article thumbnail
Vulnerable Code [Comic]
This comic depicts a conversation regarding vulnerable code. Can the characters agree as to whether this is a good or bad thing?
April 17, 2024
by Daniel Stori DZone Core CORE
· 2,013 Views · 3 Likes
article thumbnail
Wireshark and tcpdump: A Debugging Power Couple
Explore the power of Wireshark and tcpdump for network analysis in our comprehensive guide, unveiling tips for effective troubleshooting.
April 17, 2024
by Shai Almog DZone Core CORE
· 2,682 Views · 3 Likes
article thumbnail
3 Ways Blockchain Reinforces Data Integrity in the Cloud
Companies must maintain data reliability to ensure informational accuracy and security, especially in cloud-first approaches. How can blockchain keep things secure?
April 17, 2024
by Emily Newton
· 2,344 Views · 1 Like
article thumbnail
Preventing Advanced Persistent Threats in Kubernetes
Find the balance between convenience, operational efficiency, and the rising threats of Advanced Persistent Threats (APTs) in the world of ephemeral containers.
April 16, 2024
by Nigel Douglas
· 1,018 Views · 2 Likes
article thumbnail
IP Geolocation Myths and Facts
Debunking IP geolocation myths helps developers create secure apps and users make informed privacy choices.
April 15, 2024
by camimi Morales
· 1,210 Views · 1 Like
article thumbnail
Securing Mobile Apps: Development Strategies and Testing Methods
Ensure app security through continuous vigilance and informed strategies to protect user data, build trust, and prevent security breaches in today's digital landscape.
April 12, 2024
by Naga Santhosh Reddy Vootukuri DZone Core CORE
· 1,701 Views · 3 Likes
article thumbnail
SSE vs WebSockets
In this comprehensive comparison between SSE and WebSockets, explore their similarities and differences as well as highlight when and where they shine.
April 12, 2024
by Bartłomiej Żyliński DZone Core CORE
· 895 Views · 1 Like
article thumbnail
Firewall Basic Bypassing Techniques With Nmap and Hping3
Learn more about basic firewall bypassing techniques with Nmap and hping3.
Updated April 12, 2024
by Uladzislau Murashka
· 91,090 Views · 8 Likes
article thumbnail
How to Generate a Keystore and CSR Using the Keytool Command
Want to learn more about using the Java keytool command?
Updated April 12, 2024
by Arjun P Jathindramohan
· 158,500 Views · 10 Likes
article thumbnail
How to Configure and Use Secure Properties In Mule 4
Take a look at how to create and configure secure properties in Mule 4.
Updated April 11, 2024
by Priyanka Paul
· 70,806 Views · 4 Likes
article thumbnail
Improving Java Code Security
In this article, discover how to improve code quality and security with the tools SpotBugs/FindSecBugs and OWSAP Dependency Scan.
April 11, 2024
by Vinod Pahuja
· 2,906 Views · 4 Likes
article thumbnail
Singleton: 6 Ways To Write and Use in Java Programming
Here, learn how and when to write singletons and gain an appreciation of the nuances and caveats in creating singleton objects.
April 9, 2024
by Narendran Solai Sridharan
· 3,339 Views · 6 Likes
article thumbnail
Mastering Vulnerability Management: Insights from Industry Leaders at VulnCon 2024
Bitsight and Cisco experts share insights on using CVSS, EPSS, and FIRST to improve vulnerability management and advance cybersecurity careers.
April 9, 2024
by Tom Smith DZone Core CORE
· 1,819 Views · 1 Like
article thumbnail
Developing a Multi-Tenancy Application With Spring Security and JWTs
This article guides you through the process of creating a multi-tenancy application following a Software as a Service (SaaS) model, where each client has a dedicated database.
Updated April 4, 2024
by Amran Hossain DZone Core CORE
· 58,730 Views · 21 Likes
article thumbnail
Adopting DevSecOps in the Cloud-Native Playground
Security has become the utmost priority in the cloud-native world. Discover some pointers on how to tackle it and win the DevSecOps game.
Updated April 4, 2024
by Pavan Belagatti DZone Core CORE
· 6,891 Views · 15 Likes
  • Previous
  • ...
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: