Most APIs get secured after something breaks. A token leaks, an endpoint misbehaves, a pen test surfaces, an authorization gap. Suddenly, the team is patching a live system under pressure. That’s not a human failing — it’s an industry habit.…
Category: DZone Security Zone
Implementing Security-First CI/CD: A Hands-On Guide to DevSecOps Automation
Editor’s Note: The following is an article written for and published in DZone’s 2026 Trend Report, Security by Design: AI Defense, Supply Chain Security, and Security-First Architecture in Practice. DevSecOps means security is part of software delivery from the beginning, where…
Your AD Password Policies Are Security Theater
Last week, Microsoft published a three-phase plan to kill the NTLM authentication protocol. My LinkedIn feed filled up with celebrations. And I get it, the protocol has been a source of pain for decades. But almost nobody in those threads…
How AI Is Rewriting the Rules of Software Security: Machine-Speed Delivery, Shifting Risk, and New Control Points
Editor’s Note: The following is an article written for and published in DZone’s 2026 Trend Report, Security by Design: AI Defense, Supply Chain Security, and Security-First Architecture in Practice. AI has hit the gas pedal on software delivery. We are shipping…
Security Readiness Checklist: From AI Threats to Software Supply Chain Defense
Editor’s Note: The following is an article written for and published in DZone’s 2026 Trend Report, Security by Design: AI Defense, Supply Chain Security, and Security-First Architecture in Practice. Security by design is no longer a luxury of “shift left” idealism…
Treat PII as Toxic: Designing Secure Systems That Contain the Blast Radius
PII Is Not “Just Another Field” Most engineers treat all data in the same way, regardless of what it is. Names, Emails, Phone numbers, SSNs, etc., are stored as just another column in a table. In reality, not all data…
Preventing Prompt Injection by Design: A Structural Approach in Java
The Problem With How We’re Sending Data to AI Models Most Java applications that integrate with AI models do something like this: Java String userInput = request.getParameter(“topic”); String prompt = “Summarize the following topic for a financial analyst: “…
Understanding the Shifting Protocols That Secure AI Agents
New AI protocols are being adopted faster than most security teams can meaningfully assess their authentication and authorization models. MCP, A2A, and AP2 are reshaping how agents interact, but the identity layer underpinning them remains uneven and, in some cases,…
AWS vs GCP Security: Best Practices for Protecting Infrastructure, Data, and Networks
How would you comprehensively analyze and propose solutions for system, network, and infrastructure security issues on GCP and AWS, considering native and third-party cloud security services, focusing on preventing unauthorized access, securing data transmission, and enhancing overall resilience? Analyzing system,…
Advanced Middleware Architecture For Secure, Auditable, and Reliable Data Exchange Across Systems
The increasing need for a system to exchange secure, auditable and reliable data among heterogeneous systems necessitates middleware that incorporates performance, security and traceability. This is provided by the proposed architecture, which utilizes a structured workflow with authentication and security…
Algorithmic Circuit Breakers: Engineering Hard Stop Safety Into Autonomous Agent Workflows
Autonomous agents don’t just fail. They persist. They retry, replan, and chain tools until something “works.” That persistence is exactly what makes agents valuable, and exactly what makes them hazardous in production without strict execution controls. Algorithmic circuit breakers (ACBs)…
The DevOps Security Paradox: Why Faster Delivery Often Creates More Risk
A few years ago, I was part of a large enterprise transformation program where the leadership team proudly announced that they had successfully implemented DevOps across hundreds of applications. Deployments were faster. Release cycles dropped from months to days. Developers…
Delta Sharing vs Traditional Data Exchange: Secure Collaboration at Scale
Sharing large datasets securely with external partners is a major challenge in modern data engineering. Legacy methods such as transferring files via SFTP or HTTP and building custom APIs often create brittle pipelines that are hard to scale and govern.…
Automating Threat Detection Using Python, Kafka, and Real-Time Log Processing
Log-driven detections often fail for predictable engineering reasons: events arrive too late for containment, sources emit inconsistent fields, and pipelines become non-deterministic when retries and partial failures occur. Real-time log processing mitigates these failure modes by treating logs as a…
Cybersecurity with a Digital Twin: Why Real-Time Data Streaming Matters
Cyberattacks on critical infrastructure and manufacturing systems are growing in scale and sophistication. Industrial control systems, connected devices, and cloud services expand the attack surface far beyond traditional IT networks. Ransomware can stop production lines, and manipulated sensor data can…
Hidden Cyber Threat AI Is Preparing That Some Companies Aren’t Thinking About
Cyber threats are in an era where defense and attack are powered by artificial intelligence. While AI has seen a rapid advancement in recent times, it has raised concern among world leaders, policymakers and experts. Evidently, the rapid and unpredictable…
How CNAPP Bridges the Gap Between DevSecOps and Cloud Security Companies
Before CNAPP, DevOps owned code, and cloud security teams were responsible for keeping it safe. But that’s hard to do when you’re not part of the build process. This article has been indexed from DZone Security Zone Read the original…
Why Every Defense Against Prompt Injection Gets Broken — And What to Build Instead
I watched a senior engineer spend two weeks hardening their LLM-powered claims assistant against prompt injection. Input sanitization. A blocklist with 400+ attack patterns. A classifier model running in front of the main LLM. Rate limiting. He was thorough. Proud,…
Part II: The Network That Doesn’t Exist: Zero Trust, Service Meshes, and the Slow Death of Perimeter Security
The conversation that reordered my understanding of enterprise network security happened in a conference room in London in early 2019. The CISO of a mid-size financial services firm — precise, methodical, someone whose threat modeling I trusted — was describing…
Part I: The Build You Can’t See Is the One That Will Kill You: Software Supply Chains, SBOMs, and the Long Reckoning After SolarWinds
There is a specific quality of dread that experienced security practitioners get when they think carefully about what happened in December 2020. Not the dread of a novel attack technique, or an adversary with exceptional resources. The dread of recognizing,…