DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

The Latest Security Topics

article thumbnail
How To Manage Vulnerabilities in Modern Cloud-Native Applications
The article describes how to secure cloud-native applications to identify, manage, and remediate vulnerabilities across the tech stack and ways of integrating security.
Updated April 28, 2023
by Harshad Ithape
· 5,881 Views · 3 Likes
article thumbnail
Migrating FileNet Into AWS Cloud and Migrating FileNet Security Into AWS Cloud
The reader will learn the basics of migrating FileNet into AWS Cloud with an emphasis on migrating FileNet Security into AWS Cloud.
Updated April 28, 2023
by Ravikiran Kandepu
· 5,374 Views · 2 Likes
article thumbnail
Smart Contracts Step-By-Step: A Beginner’s Guide To Debugging and Deploying Smart Contracts With Infura and Truffle
In this article, we’ll walk you through a step-by-step guide on how Truffle and Infura can be utilized to debug and deploy smart contracts on Ethereum.
Updated April 28, 2023
by Michael Bogan CORE
· 5,454 Views · 5 Likes
article thumbnail
User Data Governance and Processing Using Serverless Streaming
This article delves into the concept of User Data Governance and its implementation using serverless streaming in the digital age.
Updated April 27, 2023
by Maharshi Jha
· 5,282 Views · 4 Likes
article thumbnail
Implementing RBAC in Quarkus
In this comprehensive tutorial, learn how to implement built-in and custom Role-Based Access Control (RBAC) in Quarkus to ensure secure REST API access.
Updated April 27, 2023
by Aashreya Shankar
· 6,523 Views · 5 Likes
article thumbnail
Design Patterns for Microservices: Ambassador, Anti-Corruption Layer, and Backends for Frontends
In this article, you will gain a comprehensive understanding of three design patterns and other commonly used patterns for microservices.
Updated April 27, 2023
by Andrei Rogalenko
· 10,309 Views · 2 Likes
article thumbnail
Cybersecurity: Why It’s More Important Than Ever
This article covers the importance of cybersecurity, types of threats, and measures to prevent cyber attacks in today's digital age.
Updated April 27, 2023
by Manas Sadangi CORE
· 2,985 Views · 1 Like
article thumbnail
Benefits of Manual Penetration Testing
While automated pen testing has perks, manual pen testing is still beneficial. Manual pen testers can rely on hard-earned experience, prevent false positives, and more.
Updated April 26, 2023
by Zac Amos
· 2,285 Views · 1 Like
article thumbnail
Thwarting the Theft of Resource Credentials
Using Secured Containerized Development Environments (CDEs) is a great way to protect your DevOps process and implement a robust code dev infra.
Updated February 22, 2023
by Johann Ebener
· 2,116 Views · 2 Likes
article thumbnail
SmartStoreNET: Malicious Message Leading To E-Commerce Takeover
In this article, Sonar's research and development team presents the root cause analysis of two Cross-Site Scripting bugs.
Updated April 25, 2023
by Thomas Chauchefoin
· 1,913 Views · 1 Like
article thumbnail
Azure Data Box
Azure Data Box is a product offered by Microsoft Azure that helps organizations transfer large amounts of data securely and efficiently to and from Azure.
Updated April 25, 2023
by Shripad Barve
· 2,624 Views · 2 Likes
article thumbnail
Build a Web3 Ticketing System and Disrupt Online Ticketing
Blockchains such as Ethereum can guarantee authenticity, solving the problem of counterfeit tickets. Learn how to build a ticketing solution in this tutorial.
Updated April 25, 2023
by Michael Bogan CORE
· 2,617 Views · 5 Likes
article thumbnail
10 Best Practices for Using Kubernetes Network Policies
In this article, we will explore ten best practices for using Kubernetes Network Policies to enhance the security and reliability of your applications.
Updated April 24, 2023
by Emmanuel Moila
· 5,821 Views · 3 Likes
article thumbnail
Zero Trust Network for Microservices With Istio
Securing microservices networks in the cloud has become challenging. Istio service mesh with Zero Trust Network (ZTN) philosophy offers a solution.
Updated April 23, 2023
by Anas T
· 6,274 Views · 8 Likes
article thumbnail
How To Handle Secrets in Jenkins
We will discuss the best practices for managing secrets in Jenkins, including configuring and managing secrets and how to handle potential security breaches.
Updated April 22, 2023
by Keshav Malik
· 4,467 Views · 1 Like
article thumbnail
How Can Enterprises, ML Developers, and Data Scientists Safely Implement AI to Fight Email Phishing?
These techniques identify phishing emails in real time, allowing organizations to protect themselves from cyber-attacks.
Updated March 29, 2023
by Yash Mehta
· 3,683 Views · 2 Likes
article thumbnail
Data Encryption: Benefits, Types, and Methods
This post explains data encryption and lists its benefits, types and the common encryption methods found in different tools.
Updated April 20, 2023
by Alex Tray
· 4,406 Views · 1 Like
article thumbnail
Web3 Onboarding Is Terrible: How To Make It Better With Account Abstraction and Flow
If you’re working on a web3 app, you know that onboarding users into web3 is difficult. Let's look at how Account Abstraction and Flow have created a better way.
Updated April 20, 2023
by Michael Bogan CORE
· 5,101 Views · 3 Likes
article thumbnail
Diving Into Cloud Infrastructure: An Exploration of Its Different Components
In this blog, we’ll explore the building blocks of cloud infrastructure, including virtualization, containers, microservices, and serverless computing.
Updated April 19, 2023
by Ruchita Varma
· 3,125 Views · 1 Like
article thumbnail
Tornado vs. FastAPI: Why We Made the Switch
This article will discuss the key differences between Tornado and FastAPI, two popular web frameworks for Python.
Updated April 19, 2023
by Andrei Tetka
· 3,276 Views · 2 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: