DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Security Topics

article thumbnail
Deno Security: Building Trustworthy Applications
Deno's design philosophy prioritizes security, making it an ideal choice for building secure, reliable, and trustworthy applications.
March 28, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 2,063 Views · 3 Likes
article thumbnail
Navigating the Evolving Landscape of Vulnerability Management
VulnCheck leaders share insights on navigating the challenges of vulnerability management at scale through automation, data sharing, and collaboration.
March 27, 2024
by Tom Smith DZone Core CORE
· 826 Views · 1 Like
article thumbnail
Custom Vulnerability Risk Scores: Prioritizing Threats With Precision
Learn how custom risk scores empower security teams to cut through the noise of vulnerability alerts and enable them to move with agility.
March 27, 2024
by Kiran Sama
· 825 Views · 2 Likes
article thumbnail
Types of Data Breaches in Today’s World
It is vital for organizations to be vigilant in carefully selecting the third parties with whom they allow access to sensitive data.
March 27, 2024
by Saurav Bhattacharya
· 1,582 Views · 3 Likes
article thumbnail
Empowering Developers Through Collaborative Vulnerability Management: Insights From VulnCon 2024
CVE and FIRST empower developers to create secure software through collaboration, standardization, and best practices in vulnerability management.
March 26, 2024
by Tom Smith DZone Core CORE
· 1,084 Views · 1 Like
article thumbnail
Cloud Computing Security: Ensuring Data Protection in the Digital Age
Cloud computing security is vital for protecting data, demanding robust measures to protect data stored and transmitted through cloud service.
March 26, 2024
by faboye michael
· 1,387 Views · 1 Like
article thumbnail
Unlocking IoT Security: Transitioning to Zero-Trust Architecture Simplified
Transitioning to a Zero Trust Architecture (ZTA) for IoT security involves eliminating implicit trust and continuously validating every stage of a digital interaction.
March 26, 2024
by Deep Manishkumar Dave
· 1,257 Views · 1 Like
article thumbnail
Enhancing Secure Software Development With ASOC Platforms
Elevate DevSecOps with AI-powered ASOC platforms for faster, secure software builds. Simplify compliance and enhance security. Explore more in this article.
March 26, 2024
by Alex Vakulov
· 2,588 Views · 1 Like
article thumbnail
Service Mesh Unleashed: A Riveting Dive Into the Istio Framework
This article presents an in-depth analysis of the service mesh landscape, focusing specifically on Istio, one of the most popular service mesh frameworks.
March 25, 2024
by Pramodkumar Nedumpilli Ramakrishnan
· 2,231 Views · 2 Likes
article thumbnail
Bridging IoT and Cloud: Enhancing Connectivity With Kong's TCPIngress in Kubernetes
Kong's TCPIngress bridges IoT devices with cloud-native applications, offering secure, scalable connectivity. Essential for real-time data processing and analytics.
March 25, 2024
by Rajesh Gheware
· 686 Views · 1 Like
article thumbnail
Types of Bot Traffic on a Public Internet Website
In this article, we are going to explore the different types of bot traffic that you might encounter on a public internet website and how you might handle them.
March 25, 2024
by Saurav Bhattacharya
· 521 Views · 2 Likes
article thumbnail
Empowering Developers With Scalable, Secure, and Customizable Storage Solutions
StoneFly simplifies data storage with scalable, secure, and customizable solutions. Seamless integration and unbeatable value for developers and businesses.
March 22, 2024
by Tom Smith DZone Core CORE
· 24,577 Views · 1 Like
article thumbnail
Modern Digital Authentication Protocols
The article will explore the basic theory behind the use of digital authentication protocols and simple examples of situations in which they are used.
March 22, 2024
by Divya Marupaka
· 20,384 Views · 4 Likes
article thumbnail
Getting Started With NCache Java Edition (Using Docker)
Learn how to get started with NCache Java Edition using Docker with step-by-step processes involving the creation of a clustered cache server.
March 22, 2024
by Gowtham K
· 38,027 Views · 2 Likes
article thumbnail
Securing Cloud Storage Access: Approach to Limiting Document Access Attempts
Explore how to secure cloud documents and images by limiting access attempts using GUIDs, tokens, and tracking, enhancing security for image rendering.
March 21, 2024
by Amol Gote DZone Core CORE
· 23,777 Views · 4 Likes
article thumbnail
Role-Based Multi-Factor Authentication
Multi-factor authentication is being adopted by more and more organizations these days because putting it in place greatly increases security.
March 21, 2024
by Sriram Panyam
· 16,606 Views · 6 Likes
article thumbnail
The Role of Data Brokers in Software Development: Navigating Ethics and Privacy Concerns
Discover how data brokers impact software development, ethics, and privacy. Gain insights into user behavior and preferences.
March 21, 2024
by Oliver Stone
· 17,488 Views · 1 Like
article thumbnail
Exploring the Comprehensive World of Burp Suite
Burp Suite is one of the tools available for security testing; a flexible and strong platform that helps security experts evaluate web applications' security posture.
March 21, 2024
by Vaishnavi Nayak
· 16,599 Views · 2 Likes
article thumbnail
Remote Work Security Tips for Developers
Best practices for remote work security for developers include creating office setup standards, requiring cybersecurity training, providing immediate support, and more.
March 21, 2024
by Zac Amos
· 17,454 Views · 1 Like
article thumbnail
Securing Cloud Infrastructure: Leveraging Key Management Technologies
This article explores the world of secure key management, the intricacies of KMS and HSM, their benefits, use cases, key considerations, and best practices.
March 20, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 8,001 Views · 3 Likes
  • Previous
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: