DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

The Latest Security Topics

article thumbnail
Okta as Code: Identity Management in the Cloud Native Era
Okta has become the de facto way to manage administrative access to digital resources, and this is why it should be managed as code, like all cloud resources.
Updated April 10, 2023
by Eran Bibi
· 5,044 Views · 1 Like
article thumbnail
Attaining Document Security in FileNet Content Management System
In this article, the reader will learn and understand the basic concepts of Security in FileNet Content Management Systems.
Updated April 6, 2023
by Ravikiran Kandepu
· 3,898 Views · 3 Likes
article thumbnail
Identity Federation: Simplifying Authentication and Authorization Across Systems
A mechanism that allows different identity management systems to share authentication and authorization information in a secure and standardized way.
Updated April 6, 2023
by Aditya Bhuyan
· 3,571 Views · 2 Likes
article thumbnail
Agent 008: Chaining Vulnerabilities to Compromise GoCD
This article describes three additional vulnerabilities discovered and responsibly disclosed by the SonarSource R&D team in GoCD 21.2.0.
Updated April 5, 2023
by Thomas Chauchefoin
· 4,213 Views · 1 Like
article thumbnail
Choosing the Right IAM Solution
This article goes into detail discussing qualities that developers should assess when choosing an IAM solution for their product.
Updated April 5, 2023
by Pavel Micka
· 2,265 Views · 1 Like
article thumbnail
No More Goerli Faucet! Using the New Infura Sepolia Faucet for Ethereum Smart Contract Testing
It’s difficult to get testnet ETH to test your smart contracts. Let's see how you can get free testnet ETH using the Sepolia test network and the Infura Seoplia faucet.
Updated April 5, 2023
by Michael Bogan CORE
· 2,811 Views · 3 Likes
article thumbnail
How to Use HashiCorp Boundary for Secured Remote Access
In this article, we will focus on HashiCorp Boundary as an open-source tool that is easy to use and secure.
Updated April 4, 2023
by Rajat Jain
· 2,450 Views · 1 Like
article thumbnail
Dependency Poker for Scrum Teams
Dependency Poker is an Agile game β€” similar to planning poker β€” that enables teams to identify and manage dependencies in the development process.
Updated March 31, 2023
by Nils Hyoma
· 2,484 Views · 2 Likes
article thumbnail
Enhancing Threat Intelligence and Cybersecurity With IP Geolocation
This article discusses how IP geolocation can be used to improve threat intelligence and cybersecurity measures.
Updated April 4, 2023
by Michael Chukwube
· 3,683 Views · 2 Likes
article thumbnail
Is TestOps the Future of Software Testing?
Discover the latest trend in software testing; TestOps. Learn how TestOps can streamline your testing processes and improve your software quality.
Updated April 4, 2023
by Zeppelin Bram
· 5,753 Views · 1 Like
article thumbnail
Compress File Using Mule 4 With AES 256 Encryption
This article will take the reader through a discussion of the process of zipping a file using Mule 4 with AES 2565 encryption.
Updated March 30, 2023
by ARINDAM GOSWAMI
· 2,998 Views · 1 Like
article thumbnail
Low-Code and No-Code Are the Future of Work β€” For IT and Beyond
As technical skills become democratized to support training for all employees, IT personnel are still needed to ensure that low-code and no-code tools are created safely and securely.
Updated March 30, 2023
by Vijay Sundaram
· 2,949 Views · 1 Like
article thumbnail
8 Proven Ways to Combat End-of-Life Software Risks
Nothing is built to be permanent, even the traditional software you use. You are in big trouble if you're still running the same old software for a long time. This article offers tips on avoiding the potential risks of using end-of-life software.
Updated March 30, 2023
by Tejas Kaneriya
· 3,184 Views · 1 Like
article thumbnail
Data Lakehouses: The Future of Scalable, Agile, and Cost-Effective Data Infrastructure
Get insights into the rise of data lakehouses as the future of data management, offering a scalable, flexible, and cost-effective solution that empowers organizations to harness the full potential of their data in today's fast-paced digital world.
Updated March 30, 2023
by Andrey Gusarov
· 4,196 Views · 2 Likes
article thumbnail
Overcoming Challenges and Best Practices for Data Migration From On-Premise to Cloud
This article discusses the challenges and best practices of data migration when transferring on-premise data to the cloud.
Updated March 29, 2023
by srinivas Venkata
· 3,944 Views · 2 Likes
article thumbnail
Redefining the Boundaries of People, Process, and Platforms
Kelsey Hightower shares his thoughts on the the future of developers and engineers.
Updated March 29, 2023
by Tom Smith CORE
· 4,571 Views · 1 Like
article thumbnail
Understanding MQTT Security: A Comprehensive Overview
MQTT security is a crucial factor in protecting IoT systems from various attacks and threats.
Updated March 29, 2023
by Kary Ware
· 3,535 Views · 1 Like
article thumbnail
Essential Cybersecurity Tips to Reduce the Risk of Data Breaches
Discover the essential cybersecurity tips you need to know to reduce the risk of data breaches and protect your organization.
Updated March 28, 2023
by Ryan Kh
· 2,202 Views · 1 Like
article thumbnail
Legacy Application Refactoring: How To Revive Your Aging Software
In this legacy application refactoring guide, readers will discover the benefits of refactoring and how to identify what parts of your software need it.
Updated March 28, 2023
by Tejas Kaneriya
· 2,706 Views · 1 Like
article thumbnail
Securing Cloud-Native Applications: Tips and Tricks for Secure Modernization
Discover how to modernize your security measures and keep your applications safe in the cloud era.
Updated March 28, 2023
by Tejas Kaneriya
· 2,690 Views · 1 Like
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: