Introduction As of 2023, it’s estimated that 42 billion cumulative Wi-Fi enabled devices have been shipped (Wi-Fi® by the Numbers: Technology Momentum in 2023, n.d.). Every new device adds to the increasing wireless attack surface, and it’s important for anyone…
Category: DZone Security Zone
Agentic AI for Automated Application Security and Vulnerability Management
It was not so long ago that I was having a much closer look at how AI is becoming embedded in our everyday developer work. I have watched more intelligent code suggestions, automated testing routines, and those ubiquitous chatbots become…
5 Subtle Indicators Your Development Environment Is Under Siege
Think your organization is too small to be a target for threat actors? Think again. In 2025, attackers no longer distinguish between size or sector. Whether you’re a flashy tech giant, a mid-sized auto dealership software provider, or a small…
AI-Based Threat Detection in Cloud Security
Abstract This article explores how artificial intelligence (AI) is enhancing threat detection in cloud certificate environments. It explicates how dissimilar AI modeling, such as supervised, unsupervised, and reinforcement learning, is used to describe and respond to security measures and threats…
How Trustworthy Is Big Data?
Businesses and individual users now employ big data analysis to support decision-making, engineering innovation, and productivity levels. However, the surge in the reliance on big data leads to growing concerns regarding its accuracy and trustworthiness. Although big data provides unprecedented…
Immutable Secrets Management: A Zero-Trust Approach to Sensitive Data in Containers
Abstract This paper presents a comprehensive approach to securing sensitive data in containerized environments using the principle of immutable secrets management, grounded in a Zero-Trust security model. We detail the inherent risks of traditional secrets management, demonstrate how immutability and…
Building Enterprise-Ready Landing Zones: Beyond the Initial Setup
Introduction Cloud providers offer baseline landing zone frameworks, but successful implementation requires strategic customization tailored to an organization’s specific security, compliance, operations, and cost-management needs. Treating a landing zone as a turnkey solution can lead to security gaps and operational…
Cookies Revisited: A Networking Solution for Third-Party Cookies
Cookies are fundamental aspects of a web application that end users and developers frequently deal with. A cookie is a small piece of data that is stored in a user’s browser. The data element is used as a medium to…
It’s Not About Control — It’s About Collaboration Between Architecture and Security
In the day-to-day operations of companies, solution architecture and information security are two areas that inevitably intersect. Both play a key role in building robust, scalable, and reliable technology environments. However, one question lingers — though rarely openly discussed: what…
Unlocking the Potential of Apache Iceberg: A Comprehensive Analysis
Apache Iceberg has emerged as a pioneering open table format, revolutionising data management by addressing big challenges. In this article, we’ll delve into Iceberg’s capabilities, discuss its limitations, and explore the implications for data architects. A Brief History Lesson: Hadoop’s…
Hybrid Cloud vs Multi-Cloud: Choosing the Right Strategy for AI Scalability and Security
As enterprises accelerate AI adoption, their cloud strategy determines whether they can efficiently train models, scale workloads, and ensure compliance. Given the computational intensity and data sensitivity of AI, businesses must choose between hybrid cloud and multi-cloud architectures. While both…
Issue and Present Verifiable Credentials With Spring Boot and Android
As digital identity ecosystems evolve, the ability to issue and verify digital credentials in a secure, privacy-preserving, and interoperable manner has become increasingly important. Verifiable Credentials (VCs) offer a W3C-standardized way to present claims about a subject, such as identity…
Unlocking the Benefits of a Private API in AWS API Gateway
AWS API Gateway is a managed service to create, publish, and manage APIs. It serves as a bridge between your applications and backend services. When creating APIs for our backend services, we tend to open it up using public IPs.…
While Performing Dependency Selection, I Avoid the Loss Of Sleep From Node.js Libraries’ Dangers
Running “npm install” requires trusting unknown parties online. Staring at node_modules for too long leads someone to become a node_modules expert. We Should Have Solved This Issue By 2025 The registry expands relentlessly at the rate of one new library…
Optimize Deployment Pipelines for Speed, Security and Seamless Automation
A developer’s work doesn’t stop once the code is written. The real action begins when it’s deployment day. The process—managing multiple environments, testing new features, or ensuring seamless uptime during releases—must be fast, secure, and efficient. Can you imagine a…
Zero Trust for AWS NLBs: Why It Matters and How to Do It
Introduction to AWS Network Load Balancer AWS has several critical services that drive the internet. If you have ever built any application on top of AWS and need a high throughput or volume of traffic, the chances are that you’ve…
Integrating Security as Code: A Necessity for DevSecOps
Security practices in DevOps have evolved from being a minor concern to one of the main focus points, which resulted in the DevSecOps movement. It’s about “shifting security to the left” in the software development lifecycle — so the security…
GDPR Compliance With .NET: Securing Data the Right Way
When developers hear the term GDPR, the initial reaction often involves stress and uncertainty, especially around how it might slow down development or degrade application performance. But here’s the truth: GDPR isn’t just another regulation to check off your list.…
The Transformative Power of Artificial Intelligence in Cloud Security
Cloud computing has reshaped how businesses operate, offering unmatched scalability, flexibility, and cost-efficiency. However, as organizations continue to shift critical operations to the cloud, they face escalating cybersecurity challenges. Traditional security systems often struggle to protect complex, interconnected cloud environments…
Why I Started Using Dependency Injection in Python
When I first started building real-world projects in Python, I was excited just to get things working. I had classes calling other classes, services spun up inside constructors, and everything somehow held together. But deep down, I knew something was…