Patient portals across mobile, web, and kiosk platforms have become the primary digital touchpoints between healthcare organizations and patients. The inception of these portals began with digitizing paper check-in forms and has evolved into full-fledged mobile and web applications that…
Category: DZone Security Zone
How to Use AWS IAM Identity Center for Scalable, Compliant Cloud Access Control
What Is AWS IAM Identity Center? Think of IAM Identity Center (previously AWS SSO) as the gatekeeper to your cloud environment. Its role is to make sure only the right users or services gain access to your AWS resources, and…
Infrastructure as Code Is Not Enough
When Infrastructure as Code Stops Solving the Problem Infrastructure as Code changed the industry for the better. For the first time, infrastructure could be reviewed, versioned, and deployed with the same discipline as application code. Teams moved faster, environments became…
Implementing Decentralized Data Architecture on Google BigQuery: From Data Mesh to AI Excellence
In the era of generative AI and large language models (LLMs), the quality and accessibility of data have become the primary differentiators for enterprise success. However, many organizations remain trapped in the architectural paradigms of the past — centralized data…
Probabilistic Data Structures for Software Security
We are living in an era where software systems are growing in size with each passing day and often face a constant tension between the scale, performance, and security, where each of them is essential and non-negotiable. Security tools must…
Why Your “Stateless” Services Are Lying to You
The architecture diagram shows clean rectangles. “Stateless API tier,” someone wrote in Lucidchart, then drew an arrow to a managed database. The presentation went well. Everyone nodded. Six months later, after the third incident where a rolling deployment dropped active…
5 Security Considerations for Deploying AI on Edge Devices
Edge computing has become a practical way to reduce latency and enable real-time decision-making. Running AI models on edge devices can lead to significant performance gains, especially in manufacturing, health care, transportation and infrastructure. However, distributing data across a network…
I Watched an AI Agent Fabricate $47,000 in Expenses Before Anyone Noticed
September 2024. A fintech company in Austin — I can’t name them, NDA — invited me to review their AI agent deployment. They’d built an expense processing system that was supposed to handle receipt scanning, categorization, approvals. Worked great in…
Zero-Trust Cross-Cloud: Calling AWS From GCP Without Static Keys Using MultiCloudJ
As discussed in the MultiCloudJ introduction, it is fairly common to use more than one cloud provider in enterprises. This can happen for many reasons, like mergers, choosing the best services from different clouds, or moving gradually from one cloud to another.…
OAuth Gone Wrong: The Hidden Token Issue That Brought Down Our Login System
Imagine deploying a Node.js/TypeScript backend for user authentication that works flawlessly in development, only to watch users get mysteriously logged out or unable to log in shortly after launching to production. Everything ran fine on your local machine, but in…
The DevSecOps Paradox: Why Security Automation Is Both Solving and Creating Pipeline Vulnerabilities
The numbers tell a troubling story. Forty-five percent of cyberattacks in 2024 exploited weaknesses in CI/CD pipelines, according to industry tracking data. Not application code. Not user credentials. The build and deployment infrastructure itself. This represents a fundamental shift in…
Supply Chain Security for Tools and Prompts
It’s very easy to talk about secure GenAI. But did you ever think about whether your agents are running only the prompts, tool schemas, router rules, and semantic models you intended — especially after many weeks of rapid iteration? It…
Architecting Zero-Trust Database Access in Kubernetes With Vault Dynamic Secrets
The Death of the Static Credential: An Operational Imperative In modern software architecture, speed is the primary driver of innovation. We deploy faster and scale wider, yet this velocity introduces a parallel vector of risk: complexity. Amidst this, one vulnerability…
A Unified Defense Against MITRE’s Top Injection Attacks
This is how I created a Go library to address 41 actively exploited vulnerabilities. The Problem That Keeps Security Teams Up at Night On December 11, 2025, MITRE released its annual 2025 CWE Top 25 Most Dangerous Software Weaknesses list,…
Automating Unix Security Across Hybrid Clouds
In modern DevOps, we automate deployments, testing, and infrastructure provisioning. Yet, in many organizations, server patching remains a manual, high-friction event. Admins log in late at night, run scripts, and hope services restart correctly. This manual approach is a security…
From On-Call to On-Guard: Hardening Incident Response Against Security-Driven Outages
The pager doesn’t care why production is burning. A compromised credential chain triggering mass file encryption demands the same midnight scramble as a misconfigured load balancer taking down the payment gateway. Yet most organizations still maintain separate playbooks, separate escalation…
How to Build Permission-Aware Retrieval That Doesn’t Leak Across Teams
LLM assistants or chatbots are very good at connecting the dots, which is exactly why they can be dangerous in multi-team organizations. A PM from team A asks, ‘Why did the churn rate spike last Wednesday?’ The assistant retrieves and…
Trust No Agent: How to Secure Autonomous Tools on Your Machine
Two weeks ago, one of my friends called me and asked if it was a good idea to install OpenClaw on a personal machine. The immediate thought that crossed my mind was how about security and how to reduce the…
Responding to HTTP Session Expiration on the Front-End via WebSockets
There is no doubt that nowadays software applications and products that have a significant contribution to our well-being are real-time. Real-time software makes systems responsive, reliable, and safe, especially in cases where timing is important — from healthcare and defense…
My Learning About Password Hashing After Moving Beyond Bcrypt
For a long time, I thought I had password hashing figured out. Like many Java developers, I relied on bcrypt, mostly because it’s the default choice in Spring Security. It was easy to use, widely recommended, and treated in tutorials…