With the rapid adoption of cloud technologies, organizations are rushing to migrate their workloads and data to the cloud — often at a breakneck pace. Cyber hackers are not far behind in this race. On-premises systems are no longer the…
Category: DZone Security Zone
Zero Trust Model for Nonprofits: Protecting Mission in the Digital Age
In an increasingly globally connected world, nonprofit organizations are as much at risk and vulnerable to cyber threats as large multinational corporations, if not more so. To keep cyber threats at bay, traditional security models have often relied on devices…
Why Your UEBA Isn’t Working (and How to Fix It)
User Entity Behavior Analysis (UEBA) is a security layer that uses machine learning and analytics to detect threats by analyzing patterns in user and entity behavior. Here’s an oversimplified example of UEBA: suppose you live in Chicago. You’ve lived there…
Agentic AI in Cloud-Native Systems: Security and Architecture Patterns
AI has long progressed past statistical models that generate forecasts or probabilities. The next generation of AI systems is agents, autonomous cloud-native systems capable of acting and intervening in an environment without human intervention or approval. Agents can provision infrastructure,…
Zero Trust in CI/CD Pipelines: A Practical DevSecOps Implementation Guide
Securing modern CI/CD pipelines has become significantly more challenging as teams adopt cloud-native architectures and accelerate their release cycles. Attackers now target build systems, deployment workflows, and the open-source components organizations rely on every day. This tutorial provides a practical…
Secrets in Code: Understanding Secret Detection and Its Blind Spots
In a world where attackers routinely scan public repositories for leaked credentials, secrets in source code represent a high-value target. But even with the growth of secret detection tools, many valid secrets still go unnoticed. It’s not because the secrets…
Blockchain Use Cases in Test Automation You’ll See Everywhere in 2026
The rapid evolution of digital ecosystems has placed test automation at the center of quality assurance for modern software. But as systems grow increasingly distributed, data-sensitive, and security-driven, traditional automation approaches struggle to maintain transparency, consistency, and trust. This is…
Advanced Docker Security: From Supply Chain Transparency to Network Defense
Introduction: Why Supply Chain and Network Security Matter Now In 2021, the Log4Shell vulnerability exposed a critical weakness in modern software: we don’t know what’s inside our containers. A single vulnerable library (log4j) in thousands of applications created a global…
How Migrating to Hardened Container Images Strengthens the Secure Software Development Lifecycle
Container images are the key components of the software supply chain. If they are vulnerable, the whole chain is at risk. This is why container image security should be at the core of any Secure Software Development Lifecycle (SSDLC) program.…
Building Trusted, Performant, and Scalable Databases: A Practitioner’s Checklist
Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Database Systems: Fusing Transactional Speed and Analytical Insight in Modern Data Ecosystems. Modern databases face a fundamental paradox: They have never been more accessible, yet…
When Dell’s 49 Million Records Walked Out the Door: Why Zero Trust Is No Longer Optional
I’ve spent the better part of two decades watching companies learn hard lessons about security. But nothing prepared me for what I saw unfold in 2024. It started in May. Dell disclosed that attackers had exploited a partner portal API…
Reproducibility as a Competitive Edge: Why Minimal Config Beats Complex Install Scripts
The Reproducibility Problem Software teams consistently underestimate reproducibility until builds fail inconsistently, environments drift, and install scripts become unmaintainable. In enterprise contexts, these failures translate directly into lost time, higher costs, and eroded trust. Complex install scripts promise flexibility but…
Top 5 Tips to Shrink and Secure Docker Images
I used to settle for Docker images that were massive, sometimes in GBs. I realized that every megabyte matters, impacting everything from deployment speed and cloud costs to security. With time, I realize there are well-known best practices and advanced…
Implementing Zero Trust on Google Cloud
Cybersecurity now requires more than just perimeter defences. As you adopt microservices, hybrid workloads, and AI pipelines on Google Cloud, identity becomes your new perimeter. Zero Trust means never trust and always verify. It is no longer optional but essential.…
Phishing 3.0: AI and Deepfake-Driven Social Engineering Attacks
Phishing is no longer an easy-to-detect cyberattack. With the rise of artificial intelligence, attackers now launch AI-driven phishing campaigns to mimic human behavior. They can now generate flawless emails and use deepfake phishing attacks. Email security threats are more prominent…
Building an OWASP 2025 Security Scanner in 48 Hours
OWASP dropped its 2025 Top 10 on November 6th with a brand-new category nobody saw coming: “Mishandling of Exceptional Conditions” (A10). I spent a weekend building a scanner to detect these issues and immediately found authentication bypasses in three different…
Shield Your Nonprofit: How to Tackle Ransomware Attacks
Set against the backdrop of accelerated growth of technology over the past several decades, notwithstanding large organizations, nonprofits as well have become overly reliant on technology for their day-to-day operations. New data shows that this reliance often presents opportunities for…
AI Ethics in Action: How We Ensure Fairness, Bias Mitigation, and Explainability
Like many challenges, it began with a user who continued receiving the wrong videos on her feed. It appeared to be a mere glitch in our recommendation system, but as we got deeper into it, we found that there was…
Building a Production-Ready MCP Server in Python
The Model Context Protocol (MCP) is rapidly emerging as a fundamental framework for secure AI integration. It effectively links large language models (LLMs) with essential corporate assets, such as APIs, databases, and services. However, moving from concept to production requires…
Five Nonprofit & Charity APIs That Make Due Diligence Way Less Painful for Developers
I learned this lesson the hard way. A few years back, I built a donation platform I thought was bulletproof. The design? Slick. Payments? Smooth. I figured, “Alright, I’ve nailed it.” This article has been indexed from DZone Security Zone…