DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Security Topics

article thumbnail
API Governance: Ensuring Control and Compliance in the Era of Digital Transformation
This comprehensive article explores the significance of API governance, its key components, and best practices for implementation.
March 20, 2024
by Lakshmi Sushma Daggubati
· 7,386 Views · 1 Like
article thumbnail
DevSecOps: Bridging the Gap Between Speed and Security
The article covers how DevSecOps merges security with DevOps, focusing on quick, secure software development through automation and ongoing security checks.
March 20, 2024
by Rajesh Gheware
· 3,327 Views · 1 Like
article thumbnail
SOC 2 Audits as a Pillar of Data Accountability
SOC 2 audits are critical for cloud data security, ensuring companies meet standards for managing customer data with a focus on security, availability, and privacy.
March 20, 2024
by Suhas Jangoan
· 6,629 Views · 2 Likes
article thumbnail
Secure Your Heroku Apps With SSL
If you’re building an application that needs to go toward production, you’ll undoubtedly need to serve it up securely with SSL.
March 20, 2024
by Joseph Caudle
· 3,536 Views · 1 Like
article thumbnail
The Impact of Biometric Authentication on User Privacy and the Role of Blockchain in Preserving Secure Data
Blockchain technology is a novel solution to privacy concerns and risks associated with the storage and maintenance of biometric data.
March 20, 2024
by Saurav Bhattacharya
· 5,402 Views · 2 Likes
article thumbnail
The Future of Incident Response: SOAR's Impact on Cybersecurity Defense
Discover how SOAR is revolutionizing incident response strategies, safeguarding organizations from relentless cyber threats. Stay ahead of the curve.
March 20, 2024
by Chandan Saxena
· 4,276 Views · 1 Like
article thumbnail
Design Principles-Building a Secure Cloud Architecture
To ensure cloud security, adopt key principles like least privilege, fail-safe design, and a zero-trust model for creating a robust and adaptive cloud architecture.
March 19, 2024
by Suhas Jangoan
· 10,600 Views · 3 Likes
article thumbnail
10 Commandments of API-First Development
The article offers ten vital API guidelines, emphasizing design, security, and efficiency for business success.
March 19, 2024
by Vivin Nath
· 7,302 Views · 2 Likes
article thumbnail
The Power of AI: Building a Robust Data Ecosystem for Enterprise Success
The article emphasizes the importance of building a comprehensive data ecosystem for enterprises, covering key principles, critical components, and value drivers for success.
March 19, 2024
by Siddharth Rajagopal
· 8,422 Views · 3 Likes
article thumbnail
Secure Your API With JWT: Kong OpenID Connect
In this article, walk through the issues of session-based authorization and the benefits of stateless tokens, namely JWT.
March 19, 2024
by Adam Zaręba
· 9,236 Views · 3 Likes
article thumbnail
Exploring Zero-Trust Architecture Implementation in Modern Cybersecurity
Zero-trust flips conventional security on its head by shifting from an implicit trust model to one where verification is required every step of the way.
March 19, 2024
by Igboanugo David Ugochukwu
· 8,161 Views · 2 Likes
article thumbnail
Rethinking DevOps in 2024: Adapting to a New Era of Technology
Emerging technologies, evolving methodologies, and changing business needs are redefining what it means to implement DevOps practices effectively.
March 18, 2024
by Ankush Madaan
· 4,548 Views · 1 Like
article thumbnail
Initializing Services in Node.js Application
An in-depth guide on managing service initialization in Node.js applications, illustrated with a refined JWT Service example.
March 18, 2024
by Anton Kalik
· 5,090 Views · 2 Likes
article thumbnail
Understanding the 2024 Cloud Security Landscape
This post stresses the importance of enhanced cloud security, advocating for unified security practices and Zero Trust Architecture to protect against threats.
March 16, 2024
by Rajat Gupta
· 7,904 Views · 8 Likes
article thumbnail
Building a Sustainable Data Ecosystem
Generative AI brings innovation, but it also brings challenges in privacy, fairness, and accountability in data sharing.
March 15, 2024
by Chidumga Izuzu
· 5,649 Views · 6 Likes
article thumbnail
Four Common CI/CD Pipeline Vulnerabilities
The continuous integration/continuous delivery (CI/CD) pipeline can contain numerous vulnerabilities for hackers to exploit. Here's how to address them.
March 14, 2024
by Zac Amos
· 6,045 Views · 1 Like
article thumbnail
Elevate Your Security Posture: Grafana for Real-Time Security Analytics and Alerts
This article provides a detailed walkthrough on setting up Grafana for real-time security monitoring, crafting insightful dashboards, and configuring effective alerts.
March 14, 2024
by Rajesh Gheware
· 6,107 Views · 1 Like
article thumbnail
Cohesity Simplifies Data Management and Security for Developers
Simplified data management and security for developers with a converged, AI-powered platform streamlines workflows and unlocks insights.
March 14, 2024
by Tom Smith DZone Core CORE
· 3,693 Views · 1 Like
article thumbnail
7 Essential Practices for Secure API Development
Master API security with our top 7 practices for safe and reliable API development. Ensure robust software with our expert guide.
March 12, 2024
by Boris Bodin
· 2,388 Views · 1 Like
article thumbnail
Navigating the Shift: Mastering Pod Security in Kubernetes
Master the shift to Pod Security Admission (PSA) in Kubernetes 1.25 with our guide, unlocking advanced security for your deployments.
March 12, 2024
by Rajesh Gheware
· 4,366 Views · 1 Like
  • Previous
  • ...
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: