Cybersecurity now requires more than just perimeter defences. As you adopt microservices, hybrid workloads, and AI pipelines on Google Cloud, identity becomes your new perimeter. Zero Trust means never trust and always verify. It is no longer optional but essential.…
Category: DZone Security Zone
Phishing 3.0: AI and Deepfake-Driven Social Engineering Attacks
Phishing is no longer an easy-to-detect cyberattack. With the rise of artificial intelligence, attackers now launch AI-driven phishing campaigns to mimic human behavior. They can now generate flawless emails and use deepfake phishing attacks. Email security threats are more prominent…
Building an OWASP 2025 Security Scanner in 48 Hours
OWASP dropped its 2025 Top 10 on November 6th with a brand-new category nobody saw coming: “Mishandling of Exceptional Conditions” (A10). I spent a weekend building a scanner to detect these issues and immediately found authentication bypasses in three different…
Shield Your Nonprofit: How to Tackle Ransomware Attacks
Set against the backdrop of accelerated growth of technology over the past several decades, notwithstanding large organizations, nonprofits as well have become overly reliant on technology for their day-to-day operations. New data shows that this reliance often presents opportunities for…
AI Ethics in Action: How We Ensure Fairness, Bias Mitigation, and Explainability
Like many challenges, it began with a user who continued receiving the wrong videos on her feed. It appeared to be a mere glitch in our recommendation system, but as we got deeper into it, we found that there was…
Building a Production-Ready MCP Server in Python
The Model Context Protocol (MCP) is rapidly emerging as a fundamental framework for secure AI integration. It effectively links large language models (LLMs) with essential corporate assets, such as APIs, databases, and services. However, moving from concept to production requires…
Five Nonprofit & Charity APIs That Make Due Diligence Way Less Painful for Developers
I learned this lesson the hard way. A few years back, I built a donation platform I thought was bulletproof. The design? Slick. Payments? Smooth. I figured, “Alright, I’ve nailed it.” This article has been indexed from DZone Security Zone…
Running Istio in Production: Five Hard-Won Lessons From Cloud-Native Teams
Istio has established itself as a popular, trusted, and powerful service mesh platform. It complements Kubernetes with powerful features such as security, observability, and traffic management with no code changes. Istio’s several key features strengthen cloud-native and distributed systems, ensuring…
Rethinking the Software Supply Chain for Agents
A recent MIT study reported that only about 5% of GenAI applications are creating real, measurable business value. In my opinion, that’s not a failure of ambition. If anything, most teams are experimenting aggressively. The issue is that the underlying…
Scaling Identity Governance Without Connectors: The LDAP Directory IGA Integration Pattern
In Identity Governance and Administration (IGA), connectors help keep user accounts, roles, and access permissions in sync across your applications. What if you don’t deploy a connector? What about legacy and cloud applications that don’t support SCIM, or systems…
Securing Converged AI-Blockchain Systems: Introducing the MAESTRO 7-Layer Framework
Introduction When an AI trading agent exploits a smart contract vulnerability, financial firms can lose millions in seconds. In 2024 alone, more than $1.42 billion vanished through smart contract exploits, with AI-enhanced systems showing particularly troubling weaknesses that traditional security…
DevSecConflict: How Google Project Zero and FFmpeg Went Viral For All the Wrong Reasons
Security research isn’t a stranger to controversy. The small community of dedicated niche security teams, independent researchers, and security vendors working on new products finds vulnerabilities in software and occasionally has permission to find and exploit them. This security industry…
When Chatbots Go Rogue: Securing Conversational AI in Cyber Defense
The evolution of conversational AI has introduced another dimension of interaction between businesses and users on the internet. AI chatbots have become an inseparable part of the digital ecosystem, which is no longer restricted to customer service or personalized suggestions.…
Iceberg Compaction and Fine-Grained Access Control: Performance Challenges and Solutions
Modern data lakes increasingly rely on Apache Iceberg for managing large analytical datasets, while organizations simultaneously demand fine-grained access control (FGAC) to secure sensitive data. However, combining these technologies can create unexpected performance bottlenecks that significantly impact query execution times.…
Zero Trust in API Gateways: Building Bulletproof Infrastructure With Istio and OPA
APIs: The New Battlefield Every API endpoint is a doorway. Some lead to treasure vaults. Others? Straight into disaster. I’ve spent the last five years watching enterprises get blindsided by API attacks they never saw coming. Payment processors are losing…
DPDK Cryptography Build and Tuning Guide
One of the many use cases customers run on Ampere-powered systems is packet processing workloads built on DPDK. Ampere has published a setup and tuning guide for DPDK to assist customers with getting the best performance from these workloads. Since…
Private AI at Home: A RAG-Powered Secure Chatbot for Everyday Help
Abstract This article explores the design and deployment of a secure, retrieval-augmented generation (RAG)- powered chatbot tailored for family use using Spring AI. By combining Spring AI’s modular orchestration capabilities with a local vector store and embedding models, the chatbot…
Integrating AWS With Okta for Just-in-Time (JIT) Access: A Practical Guide From the Field
When our engineering team decided to tighten security around AWS access without slowing developers down, we quickly ran into a familiar trade-off — speed vs. control. We had engineers needing quick access to production for debugging, deployments, and performance checks, but…
Evaluating AI Vulnerability Detection: How Reliable Are LLMs for Secure Coding?
Large language models (LLMs) can be used to generate source code, and these AI coding assistants have changed the landscape for how we produce software. Speeding up boilerplate tasks like syntax checking, generating test cases, and suggesting bug fixes accelerates the…
Spectre and Meltdown: How Modern CPUs Traded Security for Speed
For years, CPU designers focused on making processors faster. Techniques like out-of-order and speculative execution became standard to keep every part of the chip busy. These tricks helped achieve huge performance gains, but they also opened the door to a…