Category: DZone Security Zone

Beyond Algorithms: The Human Element in AI-Driven Cybersecurity

This article examines the convergence of artificial intelligence and cybersecurity, highlighting the importance of the human factor in the development and management of these technologies. The document addresses the integration of artificial intelligence with quantum computing, highlighting the shift in…

You Secured the Code. Did You Secure the Model?

Your team just shipped an AI-powered feature. You scanned the code. Passed SAST. Reviewed the PR. Green across the board.  But here’s what you probably didn’t scan: the model weights. The agent framework. The dataset lineage. The MCP server that your agent calls at runtime. …

How to Secure Secrets in CI/CD Pipelines

CI/CD pipelines are the foundation of modern software delivery. Every code change, no matter how small or large, always goes through automated build, test, and deployment workflows prior to production delivery, and then becomes available to end users. These CI/CD…

Effective Engineering Feedback: Software Testing

Testing is learning through questioning and acting upon questions and answers. The importance of our questions and their answers determines testing value. There is a truth hidden behind this perspective: Feedback is at the core of testing. Testing is valuable…

Securing the IT and OT Boundary in Geospatial Enterprise Systems

In modern infrastructure, the line between information technology (IT) and operational technology (OT) is blurring. Enterprise geographic information system (GIS) platforms, delivered by leading providers such as Environmental Systems Research Institute Inc. (Esri) as an implementation partner, unify spatial context…

Designing a Secure API From Day One

Most APIs get secured after something breaks. A token leaks, an endpoint misbehaves, a pen test surfaces, an authorization gap. Suddenly, the team is patching a live system under pressure. That’s not a human failing — it’s an industry habit.…

Your AD Password Policies Are Security Theater

Last week, Microsoft published a three-phase plan to kill the NTLM authentication protocol. My LinkedIn feed filled up with celebrations. And I get it, the protocol has been a source of pain for decades. But almost nobody in those threads…