DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

The Latest Security Topics

article thumbnail
Introduction to Shift Left Testing
Shift-left testing improves the efficiency and effectiveness of their software development processes.
Updated March 28, 2023
by Anshita Bhasin
· 3,751 Views · 1 Like
article thumbnail
Converting String to Enum at the Cost of 50 GB: CVE-2020-36620
In this article, readers are going to use a tutorial to learn how to convert a string to an enum at the cost of 50 GB with the CVE-2020-36620 vulnerability.
Updated March 23, 2023
by Sergey Vasiliev
· 2,242 Views · 1 Like
article thumbnail
Cachet 2.4: Code Execution via Laravel Configuration Injection
The Sonar R and D team analyzes vulnerabilities in Cachet and demonstrates the takeover instances with basic user permissions using Laravel config files.
Updated March 22, 2023
by Thomas Chauchefoin
· 1,686 Views · 2 Likes
article thumbnail
A Guide to Implementing Passwordless Login
A quick how-to you can use to use tokens for passwordless logins.
Updated February 25, 2023
by Advait Ruia
· 2,191 Views · 1 Like
article thumbnail
Web Testing Tutorial: Comprehensive Guide With Best Practices
In this article, readers will deep dive into web testing to help you understand its life cycle, elements, angles, the role of automation, and much more.
Updated March 27, 2023
by Rhea Dube
· 1,996 Views · 1 Like
article thumbnail
Using Artificial Intelligence in Finance
Using artificial intelligence has made huge strides toward becoming an integral part of many financial institutions. Read on to learn the benefits and disadvantages.
Updated March 27, 2023
by Kevin Vu
· 2,408 Views · 2 Likes
article thumbnail
Introduction To OpenSSH
Readers will learn about OpenSSH, which is an open-source suite of secure networking abilities. Readers will learn OpenSSH’s history, background, and functions.
Updated March 27, 2023
by Aditya Bhuyan
· 2,588 Views · 5 Likes
article thumbnail
Scaling Your Testing Efforts With Cloud-Based Testing Tools
The article discusses the benefits of using cloud-based testing tools to scale testing efforts, including cost savings, increased flexibility, and improved collaboration.
Updated March 27, 2023
by Kushal Dubal
· 2,313 Views · 2 Likes
article thumbnail
The Power of Docker Images: A Comprehensive Guide to Building From Scratch
Here, we’ll explore Docker images, its benefits, the process of building Docker images from scratch, and the best practices for building a Docker image.
Updated March 27, 2023
by Ruchita Varma
· 6,196 Views · 6 Likes
article thumbnail
Host Hack Attempt Detection Using ELK
Learn how using ELK to detect host hack attempts is an effective approach to enhance the security posture of an organization.
Updated March 26, 2023
by Rama Krishna Panguluri
· 3,652 Views · 2 Likes
article thumbnail
4 Best dApp Frameworks for First-Time Ethereum Developers
With the growth that Ethereum has had in recent years, developers are starting to build dApps. Read more to find out what dApp framework fits your API project.
Updated March 25, 2023
by Rachael Kiselev
· 4,266 Views · 2 Likes
article thumbnail
Stop Using Spring Profiles Per Environment
This article discusses Spring's feature, Profiles, which some may consider a bad practice. Learn an alternative way to solve this issue.
Updated March 24, 2023
by Bukaj Sytlos
· 5,573 Views · 3 Likes
article thumbnail
mTLS Everywere
Security in one's information system has always been among the most critical non-functional requirements. Here, learn more about Transport Layer Security.
Updated March 24, 2023
by Nicolas Fränkel CORE
· 7,148 Views · 3 Likes
article thumbnail
Solving the Kubernetes Security Puzzle
Cloud security can be daunting, but here are four practices you can implement today that will make your Kubernetes and cloud-native infrastructure more secure.
Updated March 21, 2023
by Upkar Lidder
· 6,795 Views · 2 Likes
article thumbnail
Why Continuous Monitoring of AWS Logs Is Critical To Secure Customer and Business-Specific Data
In this article, we will discuss the current state of AWS log management, what changes are shaping their security value, and how teams can prepare for the future.
Updated March 23, 2023
by Jack Naglieri
· 3,028 Views · 1 Like
article thumbnail
What Are the Benefits of Java Module With Example
Discover the advantages of using Java modules and how they are implemented with examples. Get a clear view of this key component in modern Java development.
Updated March 23, 2023
by Janki Mehta
· 4,955 Views · 2 Likes
article thumbnail
What Are the Different Types of API Testing?
In this article, readers will learn about different types of API testing and why they are important to the software testing process. Read to learn more.
Updated March 23, 2023
by Anna Smith
· 2,063 Views · 1 Like
article thumbnail
What Is Pen Testing?
Penetration testing is the process of testing a computer system, network, or web application to find vulnerabilities and weaknesses that hackers can exploit.
Updated March 23, 2023
by Samantha Says
· 1,809 Views · 2 Likes
article thumbnail
The Role of Identity Detection and Response (IDR) in Safeguarding Government Networks
Let’s understand how IDR is swiftly changing the cybersecurity landscape for the public sector and why government agencies must gear up for its adoption.
Updated March 23, 2023
by Deepak Gupta
· 1,895 Views · 1 Like
article thumbnail
OpenVPN With Radius and Multi-Factor Authentication
This tutorial provides a step-by-step guide to install an OpenVPN server with Radius and multi-factor authentication for additional security.
Updated March 21, 2023
by Yves Debeer
· 3,757 Views · 5 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: