Category: DZone Security Zone

Your Ultimate Website QA Checklist

A detailed website QA checklist helps make sure every aspect of the website is tested, whether through manual or automated testing approaches. It usually covers parameters like functionality, performance, usability, security, and compatibility across various browsers and devices. By following…

Achieving Zero Trust and Air-Gapped IaC in IBM Cloud With Schematics

As modern enterprises continue their journey toward cloud-native infrastructure, security and automation aren’t just nice to have; they’re absolutely essential. Particularly in regulated industries like finance, government, and healthcare, there’s a growing need to deploy Infrastructure as Code (IaC) within…

Understanding ldd: The Linux Dynamic Dependency Explorer

In the world of Linux system administration and software development, understanding how executables interact with shared libraries is crucial. Enter ldd (List Dynamic Dependencies), a powerful command-line utility that helps you peer into the complex web of library dependencies that…

AI Protection: Securing The New Attack Frontier

We’re amidst a paradigm shift in society where many product verticals are being reimagined through an ‘AI-first’ architecture. An AI-first architecture is one where much of the core business logic is driven by AI, and the product is architected to…

Seamless Security Integration Strategies in Software Development

During the software development, builders face challenges between building a better product faster versus dealing with various responsibilities that come with software development. Getting security right is one of them. Due to the increased cyber attacks, organizations started focusing on…

Why Generative AI Needs Human Oversight to Build Trust

In 2023, a generative AI-powered chatbot for a financial firm mistakenly gave investment advice that violated compliance regulations, triggering regulatory scrutiny. Around the same time, an AI-powered medical summary tool misrepresented patient conditions, raising serious ethical concerns. As businesses rapidly…

AWS WAF Classic vs WAFV2: Features and Migration Considerations

Amazon Web Services Web Application Firewall (AWS WAF) protects web programs against widespread vulnerabilities including SQL injection and cross-scriptability. Amazon Web Services WAFV2, a new WAF Classic service, introduces with it increased agility, elasticity, and operational efficiency.  In this article,…

The Role of DevSecOps in Securing Multi-Cloud Architectures

In this article, we will explore how DevSecOps transforms security in multi-cloud ecosystems. Starting with the DevSecOps phase, we will delve into how multi-cloud environments can be implemented effectively and safely. Additionally, we will examine the most significant challenges associated…

Ansible Security and Testing Tools for Automation

Automation has become the cornerstone of modern IT operations, enabling organizations to streamline processes, reduce manual errors, and improve efficiency. However, as automation grows in complexity and scale, security risks also increase. Misconfigured infrastructure, untested playbooks, and vulnerabilities in automation…

Security in the CI/CD Pipeline

As development cycles speed up, integrating security into the CI/CD pipeline is essential to embed security checks early and throughout the process to prevent vulnerabilities from creeping into production. This article delves deeper into the technical details, code examples, and…

Multi-Tenant .NET Applications With Keycloak Realms

Introduction Note: You can download the source from GitHub. I’ve been working on multi-tenant applications in the .NET ecosystem for quite a while, and one of the toughest challenges I consistently run into is secure tenant isolation — especially when…

Tackling Multidomain Integration in Software Development

Multidomain integration is becoming a cornerstone of modern software development, bridging technologies like blockchain, biotech, and consumer applications. These cross-domain projects are no longer optional — they are the future of innovation. However, combining such diverse systems presents unique challenges. …

Bringing Security to Digital Product Design

One of the biggest problems in digital product development today is the failure to collaborate with InfoSec or DevSecOps teams. Unfortunately, threats are ubiquitous and increasingly sophisticated. But did you know that there is a way to reduce the time…