DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

The Latest Security Topics

article thumbnail
Learn To Become a Web3 Developer by Exploring the Web3 Stack
In this article, I want to explore the web3 developer stack and how you can use it as a starting point to become a web3 developer.
Updated April 18, 2023
by Michael Bogan CORE
· 3,402 Views · 5 Likes
article thumbnail
Breaking the Wall Between Dev, Sec, and Ops
The steps that serve as a roadmap to enable organizations to successfully implement DevSecOps and create secure software right from the outset.
Updated April 18, 2023
by Akanksha Gupta
· 4,054 Views · 1 Like
article thumbnail
OpenShift vs. Kubernetes: The Unfair Battle
In this article, we are going to be comparing OpenShift and Kubernetes, and let me tell you, the comparison is far from fair.
Updated April 18, 2023
by Rahul Shivalkar
· 5,099 Views · 2 Likes
article thumbnail
Demystifying Data Fabric Architecture: A Comprehensive Overview
This article will provide a comprehensive overview of the data fabric architecture, its key components, and how it works.
Updated April 18, 2023
by Amlan Patnaik
· 4,182 Views · 1 Like
article thumbnail
From Zero to Hero: Learning Web3 With Infura and Python
Starting out with web3 development can be daunting, but using Python and the Infura API can take the edge off.
Updated April 17, 2023
by Alvin Lee CORE
· 4,112 Views · 4 Likes
article thumbnail
Embedded Systems Security Vulnerabilities and Protection Measures
Some tips and important consideration for embedded devices, which are often connected to the internet and can be vulnerable to various types of cyberattacks.
Updated April 17, 2023
by Sreekanth Yalavarthi
· 4,218 Views · 4 Likes
article thumbnail
Shadow and Zombie APIs: How to Minimize Vulnerabilities
There’s growing discussion on the importance of shifting left to incorporate design-time API security strategy, but how do you minimize the risk?
Updated April 17, 2023
by Gemma Sindall
· 3,137 Views · 1 Like
article thumbnail
Securing MQTT With Username and Password Authentication
This article will explain how authentication works in MQTT, what security risks it solves, and introduce password-based authentication.
Updated April 17, 2023
by Kary Ware
· 3,943 Views · 1 Like
article thumbnail
5 DNS Troubleshooting Tips for Network Teams
DNS is a critical but often ignored component of the networking stack. Monitoring DNS query anomalies can help you detect and correct underlying issues.
Updated April 17, 2023
by Terry Bernstein
· 5,242 Views · 2 Likes
article thumbnail
GitHub Exposed a Private SSH Key: What You Need to Know
Everyone has secrets leakage incidents from time to time, even massive players like GitHub. This is a good reminder we all need to stay vigilant.
Updated April 15, 2023
by Dwayne McDaniel
· 4,968 Views · 2 Likes
article thumbnail
HIPAA Compliance Testing in Software Applications
Healthcare enterprises and associated organizations must conduct rigorous testing to ensure HIPAA compliance because violations can have serious consequences.
Updated April 15, 2023
by Mohit Shah
· 3,760 Views · 2 Likes
article thumbnail
How To Build on Linea: A ZK-rollup on Ethereum
In this tutorial, let's deploy a smart contract on Linea, the new Ethereum L2 ZK-rollup, and learn about fast transactions using zero-knowledge proofs.
Updated April 14, 2023
by Michael Bogan CORE
· 3,556 Views · 3 Likes
article thumbnail
Improve AWS Security and Compliance With CDK-nag?
AWS Cloud Development Kit (AWS CDK) is a powerful tool that allows developers to define cloud infrastructure in code using familiar programming languages.
Updated April 14, 2023
by Jeroen Reijn CORE
· 3,842 Views · 2 Likes
article thumbnail
Data Encryption Is the First Line of Defense Against Identity Theft and Cybercrime
Protect your data and identity from cyber criminals with data encryption, the first line of defense against identity theft and cybercrime. Stay secure online!
Updated April 13, 2023
by Ryan Kh
· 4,501 Views · 1 Like
article thumbnail
Don’t Risk It: Critical Cybersecurity Areas New Managers Must Not Overlook
Organizations can reduce the potential risks associated with company reorganization and provide a seamless transition to the new structure.
Updated April 13, 2023
by Praveen Kumar Mannam
· 3,230 Views · 2 Likes
article thumbnail
Cybersecurity Learning Across Sectors: How ICCWS Brings Academics, Government, and Private Companies Together
The 18th International Conference on Cyber Warfare and Security gave researchers, policymakers, and security professionals a chance to share findings and ideas.
Updated April 13, 2023
by Dwayne McDaniel
· 2,189 Views · 1 Like
article thumbnail
How To Build for Payment Processing Resiliency
Can your business application handle a payment processor going down? How might you build resiliency while maintaining PCI compliance?
Updated April 12, 2023
by Alvin Lee CORE
· 3,627 Views · 5 Likes
article thumbnail
API Governance: Best Practices and Strategies for Effective API Management
A well-designed API governance framework helps organizations to establish guidelines and best practices for developing, deploying, and managing APIs.
Updated April 10, 2023
by Venkata Thota
· 4,417 Views · 7 Likes
article thumbnail
A New Era of Data Analytics: Exploring the Innovative World of Data Lakehouse Architectures
This article delves into the intricacies of Data Lakehouse architectures and their transformative potential for addressing data management and analytics challenges.
Updated April 10, 2023
by Andrey Gusarov
· 6,589 Views · 5 Likes
article thumbnail
Container Security: Top 5 Best Practices for DevOps Engineers
Container security ensures that your cloud-native applications are protected from cybersecurity threats associated with container environments.
Updated April 10, 2023
by Florian Pialoux
· 7,890 Views · 2 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: