DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Security Topics

article thumbnail
Game Theory in Blockchain: A Developer's Guide With Java Example
Enhance blockchain stability, security, and efficiency with game theory. Shape consensus mechanisms, incentives, and governance in a Java-based PoS simulation.
April 4, 2024
by Arun Pandey DZone Core CORE
· 2,765 Views · 2 Likes
article thumbnail
Unlocking Personal and Professional Growth: Insights From Incident Management
By applying the principles of incident management, developers can grow both personally and professionally, leading to more fulfilling and successful lives.
April 3, 2024
by Pradeep Gopalgowda
· 3,571 Views · 5 Likes
article thumbnail
Checking TLS and SSL Versions of Applications in JavaScript, Python, and Other Programming Languages
How to check the versions of TLS and SSL used in applications developed in various programming languages to ensure the security and integrity of data over networks.
April 3, 2024
by Elias Naduvath Varghese
· 1,183 Views · 2 Likes
article thumbnail
Next-Gen Data Protection: Navigating Data Security Challenges in 2024
Underscores the critical need for advanced security measures, innovative technologies, and comprehensive strategies to combat cyber threats and safeguard digital assets.
April 3, 2024
by Alex Tray
· 780 Views · 1 Like
article thumbnail
Rapid Expansion of Generative AI: A Call for Responsible Product Management
Responsible AI product management ensures ethical, safe, and fair AI use, focusing on integrating key principles and safety features.
April 3, 2024
by Chetan Zawar
· 605 Views · 2 Likes
article thumbnail
AI-Powered DDR: Supercharging Your Threat Detection Capabilities
In the relentless battle against cyber threats, time is of the essence. Integrating AI into DDR solutions marks a turning point in the fight against cybercrime.
April 3, 2024
by Anastasios Arampatzis
· 610 Views · 1 Like
article thumbnail
Understanding Firewalls: Your First Line of Cyber Defense
In this article, we'll delve into the significance of firewalls, their types, how they function, and best practices for implementing them effectively.
April 3, 2024
by Aditya Bhuyan
· 2,335 Views · 2 Likes
article thumbnail
Comprehensive Proxy Server Guide: Types, Applications, and Developer Examples
Proxy servers offer improved performance, security, and privacy. Here, learn about proxy server types including forward, reverse, transparent, SOCKS, and more.
April 3, 2024
by Arun Pandey DZone Core CORE
· 3,507 Views · 3 Likes
article thumbnail
Building Resilient Cybersecurity Into Supply Chain Operations: A Technical Approach
Adding cybersecurity measures into each facet of the supply chain safeguards operations and sensitive data, giving a competitive edge in the digital marketplace.
April 3, 2024
by Akanksha Pathak DZone Core CORE
· 2,864 Views · 3 Likes
article thumbnail
Understanding Prompt Injection and Other Risks of Generative AI
By prioritizing security, organizations can enhance trust, resilience, and reliability in their cloud and AI environments.
April 2, 2024
by Vidyasagar (Sarath Chandra) Machupalli FBCS DZone Core CORE
· 1,915 Views · 5 Likes
article thumbnail
XZ Utils Backdoor [Comic]
Backdoor "xz" is patched, but other doors remain open, highlighting the ongoing challenge of securing software.
April 1, 2024
by Daniel Stori DZone Core CORE
· 1,589 Views · 1 Like
article thumbnail
Maximize Kubernetes Security: Automate TLS Certificate Management With Cert-Manager on KIND Clusters
Effortlessly manage TLS certificates in Kubernetes with cert-manager. Enhance security and streamline deployments with automated certificate issuance and renewal.
March 30, 2024
by Rajesh Gheware
· 2,127 Views · 1 Like
article thumbnail
Combatting the 3 AM Ransomware Menace
Fostering a culture of cybersecurity awareness is fundamental for maintaining the integrity and availability of critical services.
March 30, 2024
by Fardin Quazi
· 2,118 Views · 4 Likes
article thumbnail
How To Implement OAuth2 Security in Microservices
Learn to implement OAuth2 Security in microservices distributed systems using OAuth2, Oauth2-Client, Spring Cloud, and Netflix components with full examples.
Updated March 29, 2024
by Amran Hossain DZone Core CORE
· 80,778 Views · 15 Likes
article thumbnail
How To Run OWASP ZAP Security Tests in Azure DevOps Pipeline
In this article, learn how configuring OWASP ZAP security tests for webpage UI or API helps to identify the security risks.
Updated March 29, 2024
by Ganesh Hegde DZone Core CORE
· 32,878 Views · 2 Likes
article thumbnail
Secure and Scalable CI/CD Pipeline With AWS
Amazon and DevOps go hand-in-hand with a number of tools and processes that enable an efficient CI/CD pipeline.
Updated March 29, 2024
by Chandani Patel
· 39,509 Views · 10 Likes
article thumbnail
Building a Fortified Foundation: The Essential Guide to Secure Landing Zones in the Cloud
Explore Secure Landing Zones (SLZ), a foundational architecture in the cloud that provides a secure environment for hosting workloads.
March 29, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 1,056 Views · 4 Likes
article thumbnail
Using Identity-Based Policies With Amazon DynamoDB
This article is designed to guide you through the benefits and implementation of these policies, supplemented with practical examples.
March 29, 2024
by Jagadish Nimmagadda
· 1,037 Views · 2 Likes
article thumbnail
Succinct SP1: The Latest Tooling for Zero-Knowledge Proofs
Meet Succinct SP1, the latest general-purpose zkVM which allows to create proofs of execution of Rust code or any other language compiled through LLVM.
March 28, 2024
by Nikolay Pryanishnikov
· 17,405 Views · 33 Likes
article thumbnail
How To Implement a Patch Management Process
Implementing a patch management process can help address known vulnerabilities. Follow these best practices and implementation steps for good patch management.
March 28, 2024
by Zac Amos
· 1,685 Views · 2 Likes
  • Previous
  • ...
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: