DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

The Latest Security Topics

article thumbnail
15 Best Practices on API Security for Developers
Secure your applications from vulnerabilities with these simple steps for developers—read our guide on 15 best API security practices for reliable protection.
Updated March 2, 2023
by Janki Mehta
· 5,938 Views · 7 Likes
article thumbnail
Zero Trust Distributed Computing With WebAssembly and WasmCloud
How zero trust computing is supported by cloud-native WebAssembly (wasm) at the module, runtime, capability, and cluster levels.
Updated March 1, 2023
by Kevin Hoffman
· 5,101 Views · 2 Likes
article thumbnail
The Impact of AI on Telecoms Fraud Protection Strategies
Telecoms fraud is a prevalent and ever-evolving issue that affects both business and individual customers in the telecommunications industry.
Updated March 1, 2023
by Ayodele Johnson
· 2,000 Views · 2 Likes
article thumbnail
Login Flow With Google Identity Services and Firebase
Most apps have some sort of authentication. For this post, we will see how this flow works using Google’s One Tap sign-in, Firebase, and Amity.
Updated March 1, 2023
by Eliza Camber
· 1,551 Views · 2 Likes
article thumbnail
The Future of Cybersecurity and How Artificial Intelligence Is Changing the Way
Artificial Intelligence is a powerful tool for identifying cyberspace vulnerabilities, threats, and attacks.
Updated March 1, 2023
by Usama Amin
· 2,156 Views · 1 Like
article thumbnail
Angular vs. React: What To Choose for Your Blockchain App?
Discover the advantages and disadvantages of each framework, and gain insights into which one may be the best fit for your project.
Updated March 1, 2023
by Megha Verma CORE
· 2,254 Views · 1 Like
article thumbnail
How to Choose the Right Data Masking Tool for Your Organization
As data privacy and security become increasingly important in today's digital landscape, selecting a robust data masking tool is crucial in protecting sensitive information.
Updated March 1, 2023
by Yash Mehta
· 3,033 Views · 1 Like
article thumbnail
Keep Your Application Secrets Secret
Handling application secrets is an integral part of the job for any backend developer nowadays. Let me show you how we should tackle these challenges!
Updated March 1, 2023
by Istvan Zoltan Nagy
· 11,761 Views · 13 Likes
article thumbnail
Security Architecture Review on a SASE Solution
Recent trends suggest that organizations are now moving to SASE solutions, replacing existing vendors that provide services like CASB, DLP, proxy solutions, etc.
Updated February 28, 2023
by Akanksha Pathak
· 3,527 Views · 2 Likes
article thumbnail
What Is API-First?
This article will show you what you need to know about API-First. How does API-First work? With benefits and the five principles of API-First development.
Updated February 28, 2023
by Hardik Thakker
· 8,049 Views · 8 Likes
article thumbnail
How SecDevOps Adoption Can Help Save Costs in Software Development
With SecDevOps, security is at the forefront of the DevOps process, enabling faster releases and more secure and reliable implementations.
Updated February 28, 2023
by Usama Amin
· 2,480 Views · 1 Like
article thumbnail
How to Obtain EV Code Signing Certificate for Azure?
All you need to know about the Azure Key Vault and How to utilize an EV Code Signing Certificate for digitally signing in the Azure Cloud platform.
Updated February 28, 2023
by Anna Shipman
· 2,418 Views · 1 Like
article thumbnail
Configure Kubernetes Health Checks
In this article, readers will learn how to configure Kubernetes health checks, which includes background info, types of probes, implementation, and more.
Updated February 27, 2023
by Pavan Belagatti CORE
· 6,414 Views · 5 Likes
article thumbnail
DevSecOps: The Broken or Blurred Lines of Defense
John Willis, co-author of The DevOps Handbook and Investments Unlimited, explores what we really mean by DevSecOps and approaches to Modern Governance.
Updated February 27, 2023
by Bruce Johnston
· 4,034 Views · 2 Likes
article thumbnail
Setting Up an SSL in a Spring Boot Application
This article describes how setting up an SSL in a Spring Boot Application could be done in two ways.
Updated February 27, 2023
by Aleksei Chaika
· 2,430 Views · 1 Like
article thumbnail
Integrating AWS Secrets Manager With Spring Boot
In this article, readers learn how Amazon Secrets Manager is a powerful tool that helps developers manage application secrets more securely with Spring Boot.
Updated February 26, 2023
by Kushagra Shandilya
· 13,331 Views · 5 Likes
article thumbnail
Dynatrace Perform: Day One
Observability and security driven by aggregating data from multiple sources is critical to the development and maintenance of software that works perfectly.
Updated February 26, 2023
by Tom Smith CORE
· 4,015 Views · 1 Like
article thumbnail
Understanding Static Code Analysis
This article talks about static code analysis, the benefits and limitations of using a static code analysis tool, and the use case of automated tools in debugging and enhanced security.
Updated February 26, 2023
by Avya Chaudhary
· 1,983 Views · 1 Like
article thumbnail
HTTP 1 vs. HTTP 1.1 vs. HTTP 2: A Detailed Analysis
This article presents a detailed analysis of the differences between major HTTP versions such as HTTP 1, HTTP 1.1, and HTTP2.
Updated February 26, 2023
by Eden Allen
· 2,178 Views · 2 Likes
article thumbnail
Exploring the Architecture of Amazon SQS
In this article, learn how Amazon SQS works and how it can be used to create distributed applications, explore the components of SQS, and its architecture.
Updated February 25, 2023
by Satrajit Basu CORE
· 6,301 Views · 1 Like
  • Previous
  • ...
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: