DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

The Latest Security Topics

article thumbnail
Supply Chain Security: What Is SLSA? Part I
Attacks on software supply chains have evolved into dangerous threats. Let’s discuss the SLSA framework to understand where supply chain security is headed.
Updated March 9, 2023
by Tiexin Guo
· 3,829 Views · 1 Like
article thumbnail
RSA Algorithm: A Trusted Method for Encrypting and Securing Data
This article explains the secure data transmission of RSA algorithms and how public and private keys work.
Updated March 9, 2023
by Crumb Peter
· 3,830 Views · 1 Like
article thumbnail
The Power of Zero-Knowledge Proofs: Exploring the New ConsenSys zkEVM
See how ConsenSys zk-rollups are evolving at a rapid pace and leading the way in helping Ethereum to scale to new levels.
Updated March 9, 2023
by John Vester CORE
· 27,844 Views · 5 Likes
article thumbnail
Authenticate With OpenID Connect and Apache APISIX
We want to avoid being locked into one identity provider. Here, see a demo of how to use OpenID Connect using Google underneath and then switch to Azure.
Updated March 8, 2023
by Nicolas Fränkel CORE
· 3,825 Views · 6 Likes
article thumbnail
Solving the Enduring Pain of Authorization With Aserto’s Co-Founder and CEO, Omri Gazitt
Security requirements such as authorization and access can be a pain. Dev Interrupted interviews Omri for some tips and tricks.
Updated March 8, 2023
by Dan Lines CORE
· 3,247 Views · 3 Likes
article thumbnail
AWS Multi-Account Strategy and Landing Zone
This article provides information on AWS multi-account strategies and the necessary services required for constructing a landing zone with guide visuals.
Updated March 8, 2023
by Rahul Nagpure
· 2,717 Views · 2 Likes
article thumbnail
Dependency Injection and Ways to Inject It Using .NET Core API
In this article, readers will use a tutorial to learn about dependency injections and how to inject them using .NET Core API, including code and visuals.
Updated March 7, 2023
by Jaydeep Patil
· 2,070 Views · 2 Likes
article thumbnail
Secure APIs: Best Practices and Measures
In this article, we will discuss API Security measures and best practices in securing the APIs or web services.
Updated March 7, 2023
by Sunil Kumar Rangineni
· 5,019 Views · 7 Likes
article thumbnail
5 Ways to Secure a Virtual Machine in Cloud Computing
Five critical recommendations to secure a virtual machine in a cloud computing environment.
Updated March 7, 2023
by Alex Tray
· 2,824 Views · 2 Likes
article thumbnail
Product Security (DevSecOps Practices)
In this article, we will discuss product security, why it is needed, DevSecOps best practices, and its benefits.
Updated March 6, 2023
by Sunil Kumar Rangineni
· 1,976 Views · 5 Likes
article thumbnail
Understanding and Resolving a Common Error
In this post, we will explain what causes the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error and provide some tips on how to resolve it.
Updated March 6, 2023
by Eden Allen
· 1,786 Views · 2 Likes
article thumbnail
Building a Certificate Authority (CA) Server for Your Servers and Applications Free of Cost
Learn the steps to install a certificate authority server on Windows Server. Use for your internal servers, applications, and databases, free of cost.
Updated March 4, 2023
by sagar pawar
· 3,340 Views · 1 Like
article thumbnail
How Artificial Intelligence Is Transforming Cybersecurity
Discover how artificial intelligence is revolutionizing cybersecurity and learn about the benefits it provides to businesses and organizations.
Updated March 4, 2023
by Ryan Kh
· 3,946 Views · 2 Likes
article thumbnail
Make Your Security Policy Auditable
In this article, learn how you can leverage OPA and Apache APISIX to move your authentication and authorization logic from the code to the infrastructure.
Updated March 3, 2023
by Nicolas Fränkel CORE
· 4,553 Views · 2 Likes
article thumbnail
Please Pick a Number
It may seem that the issue of ensuring the proper quality of random data doesn’t concern us unless we directly deal with cryptography, but it is not necessarily the case.
Updated March 3, 2023
by Krzysztof Atlasik
· 3,935 Views · 1 Like
article thumbnail
Readability in the Test: Exploring the JUnitParams
In this video tutorial, learn how to put more elegance in your test code by using JUnitParams. Learn types and how to simplify your tests with these techniques.
Updated March 3, 2023
by Otavio Santana CORE
· 6,945 Views · 4 Likes
article thumbnail
IAM Best Practices
Download this cheat sheet on IAM, Identity and Access Management, and best practices. It will help you make your cloud environments more secure.
Updated March 2, 2023
by Dwayne McDaniel
· 4,153 Views · 1 Like
article thumbnail
Strategy for Combating New Threat Actors and Emerging Cyberattacks and Risks
This article proposes a security strategy that builds upon the well-established Defense-in-Depth concept, complemented by Zero trust.
Updated March 2, 2023
by Pascal Tene
· 4,192 Views · 3 Likes
article thumbnail
CloudNativeSecurityCon 2023: A Unique Community Event Focused On the Future of Open Source and Cloud Native Security
Highlights from CloudNativeSecurityCon 2023, the first-of-its-kind in-person event, grown from the community's conversations on the front lines of open-source security.
Updated March 2, 2023
by Dwayne McDaniel
· 2,647 Views · 2 Likes
article thumbnail
Website Testing: A Detailed Guide
This article takes a deep look into website testing, the structure of web applications, common website testing methods, testing locally hosted websites, etc.
Updated March 2, 2023
by Amrita Angappa
· 2,836 Views · 2 Likes
  • Previous
  • ...
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: