If you are living in the same world as I am, you must have heard the latest coding buzzer termed “microservices”—a lifeline for developers and enterprise-scale businesses. Over the last few years, microservice architecture emerged to be on top of…
Category: DZone Security Zone
Deploy a Kubernetes Application With Terraform and AWS EKS
When it comes to infrastructure provisioning, including the AWS EKS cluster, Terraform is the first tool that comes to mind. Learning Terraform is much easier than setting up the infrastructure manually. That said, would you rather use the traditional approach…
Dynatrace Perform: Day Two
The second day of Dynatrace Perform kicked off with a great discussion between Kelsey Hightower, distinguished developer advocate at Google Cloud Platform, and Andi Grabner, DevOps evangelist at Dynatrace. The theme of their discussion was redefining the boundaries of people, processes, and…
Protecting User Data in Microsoft 365: A Step-by-Step Guide
Introduction Microsoft 365 is a popular productivity suite used by organizations of all sizes. While it offers a wealth of features and benefits, it also poses security challenges, especially in terms of protecting user data. With cyber threats on the…
Are Industrial IoT Attacks Posing a Severe Threat to Businesses?
What is the Industrial Internet of Things (IIoT)? IIoT refers to using interconnected devices, sensors, and machines in industrial settings. These devices can monitor and analyze data from various systems, giving businesses real-time insights into their operations. For example, a…
The Ultimate Guide What To Look Out for in Web Hosting
Web hosting is a service that allows individuals and organizations to make their websites accessible on the internet. When you create a website, you need a place to store all of your website’s files, such as HTML, CSS, and images.…
How To Collect and Ship Windows Events Logs With OpenTelemetry
If you use Windows, you will want to monitor Windows Events. A recent contribution of a distribution of the OpenTelemetry (OTel) Collector makes it much easier to monitor Windows Events with OpenTel. You can utilize this receiver either in conjunction…
How To Test IoT Security
Though the Internet of Things (IoT) has redefined our lives and brought a lot of benefits, it has a large attack surface area and is not safe until it is secure. IoT devices are an easy target for cybercriminals and…
Identity Federation and SSO: The Fundamentals
In many software organizations, terms like authentication, SSO, and SAML are heard pretty often. Admittedly, many people will run away when hearing these terms, trying to avoid doing any authentication-related work. In this article, we will go over SSO fundamentals…
Security in Game Development
The gaming industry has seen tremendous growth in recent years, with millions of players engaging in online games daily. As the industry grows, so does the need for secure game development practices. Cyberattacks are becoming more sophisticated and frequent, making…
GKE Security: Top 10 Strategies for Securing Your Cluster
Security is one of the key challenges in Kubernetes because of its configuration complexity and vulnerability. Managed container services like Google Kubernetes Engine (GKE) provide many protection features but don’t take all related responsibilities off your plate. Read on to…
Backup Vs. Disaster Recovery: What Are the Key Differences?
Backup and disaster recovery are two critical components of a comprehensive data management strategy for businesses of all sizes. However, while both terms are often used interchangeably, they refer to two distinct processes. This article will examine the key differences…
Top 10 Resources for Learning Solidity
If you want to become a smart contract developer on Ethereum, then you need to learn Solidity. Whether your goal is DeFi, blockchain gaming, digital collectibles (NFTs), or just web3 in general, Solidity is the foundational language behind the innovative…
Strategy for Combating New Threat Actors and Emerging Cyberattacks and Risks
With the cyber threat landscape growing constantly and cyberattacks becoming more sophisticated, it is imperative for any organization to be well-prepared with a clear and actionable cyber defense strategy. As noted by Chuck Robbins, Chairman, and CEO at Cisco,…
Open-Source Authorization as a Service
Background Information The story starts back in 2007 when our founders, Omri Gazitt and Gert Drapers, were working on what would eventually become Azure Active Directory. At that time, Active Directory was a keystone workload for Windows Server. It enabled…
How To Reduce the Impact of a Cloud Outage
Can you prevent a cloud outage from negatively impacting your business? It isn’t always possible to anticipate cloud outages, but there are steps you can take to minimize their impact on your team. How can you get started preparing for…
GraphQL vs Protobuf: Differences, Similarities, and Uses
Both GraphQL and Protocol Buffers (Protobuf) are types of formats for transferring data between client and server. Each has its own set of advantages and disadvantages, and are used in different contexts, depending on the specific requirements of an application.…
SAST and SCA Complemented with Dynamic Observability for CVE Prioritization
Over the past years, the adoption of Agile and DevOps grew, and together with it, we have also observed the rise of DevSecOps. Such practice recommends shifting left security testing and remediation of security vulnerabilities as early as possible within the…
Protect Your Domain With DNSSEC on AWS Route53 and GoDaddy Registrar
DNSSEC, short for Domain Name System Security Extensions, is a set of protocols that aim to secure the domain name system (DNS) against various security threats such as spoofing, cache poisoning, and eavesdropping. DNSSEC is designed to protect the authenticity…
5 Reasons You Need to Care About API Performance Monitoring
Connectivity is so daunting. By far, we are all used to instant connectivity that puts the world at our fingertips. We can purchase, post, and pick anything, anywhere, with the aid of desktops and devices. But how does it happen?…
When Technology Broke and How We Fixed It (The Evolution of APIs)
What in the World Is Technology? Technology is anything that makes tasks easier. It could be something as simple as a thimble to something as complex as AI. Technology, overall, has made life easier, more convenient, and more efficient. We’ll…
Security in Game Development
The gaming industry has seen tremendous growth in recent years, with millions of players engaging in online games daily. As the industry grows, so does the need for secure game development practices. Cyberattacks are becoming more sophisticated and frequent, making…
Identity Federation and SSO: The Fundamentals
In many software organizations, terms like authentication, SSO, and SAML are heard pretty often. Admittedly, many people will run away when hearing these terms, trying to avoid doing any authentication-related work. In this article, we will go over SSO fundamentals…
How to Debug Websites Using Safari Developer Tools
Safari is the default browser on iPads, Macbooks, and iPhones. It lies second on browser preferences, right after Chrome. Its 250+ features offer users striking benefits that set it apart from other most popular browsers like Chrome and Firefox. Building on that,…
Decentralized Data Mesh With Apache Kafka in Financial Services
Digital transformation requires agility and fast time to market as critical factors for success in any enterprise. The decentralization with a data mesh separates applications and business units into independent domains. Data sharing in real-time with data streaming helps provide…
Data Engineering Practices to Avoid
Data engineers are increasingly in high demand, especially as more company leaders realize it’s necessary to use reliable information for better decision-making. However, even the most skilled and experienced professionals can make mistakes. Here are some of them and how…
Enhancing Security with Two-Factor Authentication: An Introduction to TOTP and HOTP
One of the most popular method of authentication remains the password. In a previous article, we discussed the proper implementation of password authentication. However, relying solely on a password as the means of authentication is no longer sufficient, especially for…
Powering Manufacturing With MLOps
Machine learning is one of the most disruptive technologies across industries today. Despite this versatility and potential, many organizations struggle to capitalize on this technology’s full potential, especially in sectors like manufacturing that lack widespread ML skills and knowledge. High…
Authenticate Users via Face Recognition on Your Website or App
In this tutorial, we will be building a simple yet smart web application, to demonstrate how to authenticate users on a typical website or web application via face recognition instead of the traditional login/password pair. In this process, we are…
How To Scan a URL for Malicious Content and Threats in Java
At this point, we’ve all heard the horror stories about clicking on malicious links, and if we’re unlucky enough, perhaps we’ve been the subject of one of those stories. Here’s one we’ll probably all recognize: an unsuspecting employee receives…
Generative AI for DevOps: A Practical View
The concept of generative AI describes machine learning algorithms that can create new content from minimal human input. The field has rapidly advanced in the past few years, with projects such as the text authorship tool ChatGPT and realistic image creator DALL-E2…
The Evolution of Cloud-Native Authorization
Authentication in the Age of SaaS and Cloud Let’s start with the differences between authentication and authorization. People tend to lump these concepts together as auth, but they’re two distinct processes. Authentication describes the process of finding out that you are…
Test Data Compliance: How to Rewrite Your Organization’s DNA
“We mustn’t use live data for testing.” This is the reason why most organizations start to look at superficial solutions to certain challenges that are ingrained in their DNA. For years, this aversion has driven the way that organizations have…
Securing the Clouds: An Evaluation of Cloud Security Solutions
Cloud security is an ever-evolving challenge, as organizations must consider the security of the cloud provider, the configuration of the services they offer, and the security of their own internal systems that store and access cloud-based data. Organizations must continuously…
Defending Against Data Breaches: An Overview of Cyber Insurance for MSPs
Cyber insurance is a type of insurance policy designed to protect businesses and individuals against losses resulting from cyber-attacks and data breaches. In addition, it provides financial support in the event of a breach, covering costs such as legal fees,…
Your Go-to Guide to Develop Cryptocurrency Blockchain in Node.Js
Making your hands dirty by learning how to create blockchain will assist you in appreciating the technology and how it works,” says Elliot Minns, a coding and cryptocurrency guru. In this article, you will learn how to build an easy cryptocurrency blockchain…
Which Type of MFA Is Most Secure?
More and more people are adopting multi-factor authentication today to protect themselves from increasing rates of hacking and data theft. Several popular options are available for MFA, but which is the most secure and effective? 1. Social Media Login One…
What Is Browser Sandboxing?
With a rapidly changing business landscape, security is one of the biggest challenges for developers and testers in their modern web development cycle. The complexity of building and deploying modern web apps leads to more security vulnerabilities. As per a…
Securing Admin Access to Apache APISIX
API Gateways are critical components in one’s infrastructure. If an attacker could change the configuration of routes, they could direct traffic to their infrastructure. Consequences could range from data theft to financial losses. Worse, data theft could only be noticed…
Release Management: Is Your Product Ready for Success?
You never get a second chance to make a first impression. So how do you make sure it’s a good one? This matter is constantly in the mind of release managers and product owners because they know that once a…
How to Secure Your Website in 10 Easy Steps
A website for your business is essential for reaching a wider audience and establishing a solid online presence. However, security should be a top priority when creating a website to protect your business and customers from cyber threats. Securing a…
Get Up to Speed With the Latest Cybersecurity Standard for Consumer IoT
With growing concern regarding data privacy and data safety today, Internet of Things (IoT) manufacturers have to up their game if they want to maintain consumer trust. This is the shared goal of the latest cybersecurity standard from the European…
Integrating DevOps with IT Service Management (ITSM): Best Practices for Effective DevOps-ITSM Integration
Integrating DevOps with IT Service Management (ITSM) is a critical step for organizations looking to improve the speed, quality, and reliability of their software delivery processes. DevOps and ITSM are complementary approaches that can significantly benefit each other when integrated…
Principle of DevOps: Establish a Successful Development Team
Undertaking a DevOps transformation can be overwhelming for many organizations. The initial phase of the journey can be complex and more challenging; “Where do I begin?” and “What quick successes can I attain to foster early progress?” It is easier…
Data Privacy From a Data Governance Standpoint
Data governance (DG) is the process of managing the availability, usability, integrity, privacy, and security of the data in enterprise systems based on internal data standards and policies that also control data usage. Effective data governance ensures that data is…
GraphQL vs REST: Differences, Similarities, and Why To Use Them
Modern applications allow us to get connected to the world like never before. However, how is this structure so effective in providing a robust connection between different applications and data sharing between different devices? API (Application Programming Interface) allows developers…
Introduction to Kubernetes Event-Driven Auto-Scaling (KEDA)
Manual scaling is slowly becoming a thing of the past. Currently, autoscaling is the norm, and organizations that deploy into Kubernetes clusters get built-in autoscaling features like HPA (Horizontal Pod Autoscaling) and VPA (Vertical Pod Autoscaling). But these solutions have…
Test Data Compliance: How to Rewrite Your Organization’s DNA
“We mustn’t use live data for testing.” This is the reason why most organizations start to look at superficial solutions to certain challenges that are ingrained in their DNA. For years, this aversion has driven the way that organizations have…
How To Use MQTT in Golang
Golang is a statically, strongly typed, compiled, concurrent, and garbage-collecting programming language developed by Google. Go is expressive, clean, and efficient. Its concurrency mechanism makes it easy to write programs that maximize the use of multicore and network machines, and…
What Is an API Integration Example?
An API integration is the code that allows one system to transfer data to or from another system while using an API (application programming interface) to securely access the system. Some API integrations may only have an API on one…
Legacy Code Refactoring: Tips, Steps, and Best Practices
Nobody loves to work on legacy code because it can be a confusing endeavor; at best, it’s time-consuming. But do we now live with the huge repercussions and costs of retaining and utilizing legacy codes as they are? Legacy code…
Securing the Clouds: An Evaluation of Cloud Security Solutions
Cloud security is an ever-evolving challenge, as organizations must consider the security of the cloud provider, the configuration of the services they offer, and the security of their own internal systems that store and access cloud-based data. Organizations must continuously…
Defending Against Data Breaches: An Overview of Cyber Insurance for MSPs
Cyber insurance is a type of insurance policy designed to protect businesses and individuals against losses resulting from cyber-attacks and data breaches. In addition, it provides financial support in the event of a breach, covering costs such as legal fees,…
Your Go-to Guide to Develop Cryptocurrency Blockchain in Node.Js
Making your hands dirty by learning how to create blockchain will assist you in appreciating the technology and how it works,” says Elliot Minns, a coding and cryptocurrency guru. In this article, you will learn how to build an easy cryptocurrency blockchain…
What Is Browser Sandboxing?
With a rapidly changing business landscape, security is one of the biggest challenges for developers and testers in their modern web development cycle. The complexity of building and deploying modern web apps leads to more security vulnerabilities. As per a…
Application Mapping: 5 Key Benefits for Software Projects
Application Dependency Mapping is the process of creating a graphical representation of the relationships and dependencies between different components of a software application. This includes dependencies between modules, libraries, services, and databases. It helps to understand the impact of changes…
Data Privacy From a Data Governance Standpoint
Data governance (DG) is the process of managing the availability, usability, integrity, privacy, and security of the data in enterprise systems based on internal data standards and policies that also control data usage. Effective data governance ensures that data is…
The Role of Cloud-Native Security in Application Delivery
One of the commonly noticed challenges with companies adopting cloud-native architectures and a container-driven development journey is that they are not clear about why they’re choosing the path. Now, this might surprise you because organizations are investing a lot of…
The Ongoing Battle: Is Time on the Side of Hackers or Defenders?
After a new CVE (common vulnerabilities and exposures) is made public, cybercriminals often start searching the internet for systems that can be exploited within an hour. However, what happens if the developers of the vulnerable software do not release patches…
DevOps Challenges to Watch Out for in 2023: and How to Approach Them
DevOps has never been more popular than it is right now. As a result, the global DevOps market, valued at approximately $7 million in 2021, is expected to surpass $37 million by 2030. While the emerging methodology brings efficiency and…
How to Create a Dockerfile?
Docker is a powerful tool for creating, deploying and running container applications. A Dockerfile is a script that contains instructions for building a Docker image. It is used to automate the process of creating a container image so that developers…
13 Code Quality Metrics That You Must Track
Speed has become the new currency in this fast-paced digital world. Customers expect services to be delivered at high speed, and businesses that meet this demand have a significant edge in the market. And DevOps has empowered businesses to deliver…
Deduplication and Data Stewardship Process in MDM
Data Deduplication in MDM In master data management, often the same data is duplicated across several departments, which can harm the business. That’s why data deduplication is necessary to maintain an accurate master data record. It includes the removal of…
9 Ways You Can Improve Security Posture
Cyber threats are growing exponentially, both in volume and sophistication. A major portion of these threats can go unidentified, or they are detected too late for an organization to avoid data breaches or other related risks. The tangible costs of…
Development Platform for Data Protection
The 48th IT Press Tour had the opportunity to attend a private screen event with HYCU, where Simon Taylor, CEO, and Founder, introduced their solution to securing SaaS applications and data. HYCU exists to eliminate data silos and provide end-to-end data…
Remote Debugging Dangers and Pitfalls
This is the last part of the debugging series. To learn the rest, you’ll need to get the book “Practical Debugging at Scale: Cloud Native Debugging in Kubernetes and Production” or the course. One of the most frequently asked questions…
Reduce Data Breaches by Adding a Data Privacy Vault to Your HealthTech App Architecture
With the rising adoption of healthcare apps and wearable devices that gather medical data, the importance of data privacy for HealthTech companies is greater than ever. Companies that work with PHI must ensure they’re HIPAA-compliant, lest they face fines, lawsuits,…
Introduction to Azure Data Lake Storage Gen2
Built on Azure Blob Storage, Azure Data Lake Storage Gen2 is a suite of features for big data analytics. Azure Data Lake Storage Gen1 and Azure Blob Storage’s capabilities are combined in Data Lake Storage Gen2. For instance, Data Lake…
The New DevOps Performance Clusters
In 2022, the Accelerate State of DevOps Report contained a few surprises. One was a change to the traditional performance clusters. The report also introduced a new way to group organizations using an extra dimension. This post introduces you to…
Microsoft Azure Key Vault Service
One of Azure’s key management options, Azure Key Vault, aids in the following issues’ resolution. Secrets Management: Tokens, passwords, certificates, API keys, and other secrets can be securely stored and access to them can be tightly controlled using Azure Key…
Writing a Modern HTTP(S) Tunnel in Rust
Learn how to write performant and safe apps quickly in Rust. This post guides you through designing and implementing an HTTP Tunnel, and covers the basics of creating robust, scalable, and observable applications. Rust: Performance, Reliability, Productivity About a year…
Top Three Docker Alternatives To Consider
Docker is a containerization technology that allows developers to package and deploy applications in lightweight, portable containers. These containers are isolated from the host operating system, which makes them portable across different environments and eliminates the “works on my machine”…
DevSecOps Benefits and Challenges
Performing AST (Application Security Testing) is a common and effective way to find vulnerabilities and weaknesses in an application and make it resistant to security threats. However, traditionally, AST has been performed at the end of the software/application development process,…
The Data Leakage Nightmare in AI
Nowadays, we think of artificial intelligence as the solution to many problems and as a tool that can help humanity achieve huge things faster and with less effort. Of course, those thoughts are not far from being true, but it…
SAST: How Code Analysis Tools Look for Security Flaws
Here we’ll discuss how SAST solutions find security flaws. I’ll tell you about different and complementary approaches to detecting potential vulnerabilities, explain why each of them is necessary, and how to turn theory into practice. SAST (Static Application Security Testing)…
9 Ways You Can Improve Security Posture
Cyber threats are growing exponentially, both in volume and sophistication. A major portion of these threats can go unidentified, or they are detected too late for an organization to avoid data breaches or other related risks. The tangible costs of…
Development Platform for Data Protection
The 48th IT Press Tour had the opportunity to attend a private screen event with HYCU, where Simon Taylor, CEO, and Founder, introduced their solution to securing SaaS applications and data. HYCU exists to eliminate data silos and provide end-to-end data…
Remote Debugging Dangers and Pitfalls
This is the last part of the debugging series. To learn the rest, you’ll need to get the book “Practical Debugging at Scale: Cloud Native Debugging in Kubernetes and Production” or the course. One of the most frequently asked questions…
Reduce Data Breaches by Adding a Data Privacy Vault to Your HealthTech App Architecture
With the rising adoption of healthcare apps and wearable devices that gather medical data, the importance of data privacy for HealthTech companies is greater than ever. Companies that work with PHI must ensure they’re HIPAA-compliant, lest they face fines, lawsuits,…
Introduction to Azure Data Lake Storage Gen2
Built on Azure Blob Storage, Azure Data Lake Storage Gen2 is a suite of features for big data analytics. Azure Data Lake Storage Gen1 and Azure Blob Storage’s capabilities are combined in Data Lake Storage Gen2. For instance, Data Lake…
The New DevOps Performance Clusters
In 2022, the Accelerate State of DevOps Report contained a few surprises. One was a change to the traditional performance clusters. The report also introduced a new way to group organizations using an extra dimension. This post introduces you to…
Writing a Modern HTTP(S) Tunnel in Rust
Learn how to write performant and safe apps quickly in Rust. This post guides you through designing and implementing an HTTP Tunnel, and covers the basics of creating robust, scalable, and observable applications. Rust: Performance, Reliability, Productivity About a year…
Hackerman [Comic]
This article has been indexed from DZone Security Zone Read the original article: Hackerman [Comic]
What Makes ReactJS Good for Logistics Applications in 2023?
As the logistics industry continues to grow and become increasingly complex, businesses are looking for ways to simplify their operations and increase efficiency. This is where ReactJs comes in! This article has been indexed from DZone Security Zone Read the…
The 12 Biggest Android App Development Trends in 2023
The world of Android app development is constantly evolving, and staying up-to-date with the latest trends is essential for businesses and developers alike. As an Android App Development Company, it’s important to stay ahead of the curve and offer the…
The Data Leakage Nightmare in AI
Nowadays, we think of artificial intelligence as the solution to many problems and as a tool that can help humanity achieve huge things faster and with less effort. Of course, those thoughts are not far from being true, but it…
DevSecOps Benefits and Challenges
Performing AST (Application Security Testing) is a common and effective way to find vulnerabilities and weaknesses in an application and make it resistant to security threats. However, traditionally, AST has been performed at the end of the software/application development process,…
SAST: How Code Analysis Tools Look for Security Flaws
Here we’ll discuss how SAST solutions find security flaws. I’ll tell you about different and complementary approaches to detecting potential vulnerabilities, explain why each of them is necessary, and how to turn theory into practice. SAST (Static Application Security Testing)…
Top Authentication Trends to Watch Out for in 2023
The internet has become one of the most critical sectors for business communications, and businesses have been transforming it into a reliable customer acquisition channel. With that being said, companies are also facing opportunities to build reputations and establish relationships…
An Introduction to Data Mesh
As more and more teams have started to look for solutions that can help them unlock the full potential of their systems and people, decentralized architectures have started to become more and more popular. Whether it’s cryptocurrencies, microservices, or Git,…
How to Secure Your CI/CD Pipeline
Recently, we learned of a breach of CircleCI. They strongly suggest that all their customers: Immediately rotate any and all secrets stored in CircleCI. Review internal logs for their systems for unauthorized access from December 21, 2022, through January 4,…
A Brief Overview of the Spring Cloud Framework
The concept of distributed applications is certainly not new. Whoever has a long IT career certainly remembers a number of different technologies implementing distributed components even in the early years. Nowadays, is all about microservices. They are a new form…
The 31 Flavors of Data Lineage and Why Vanilla Doesn’t Cut It
Data lineage, an automated visualization of the relationships for how data flows across tables and other data assets, is a must-have in the data engineering toolbox. Not only is it helpful for data governance and compliance use cases, but it…
Easy Smart Contract Debugging With Truffle’s Console.log
If you’re a Solidity developer, you’ll be excited to hear that Truffle now supports console logging in Solidity smart contracts. While Truffle has long been a leader in smart contract development tooling—providing an easy-to-use environment for creating, testing, and debugging…
What Is Policy-as-Code? An Introduction to Open Policy Agent
In the cloud-native era, we often hear that “security is job zero,” which means it’s even more important than any number one priority. Modern infrastructure and methodologies bring us enormous benefits, but, at the same time, since there are more…
Data Mesh vs. Data Fabric: A Tale of Two New Data Paradigms
Data is one of the most critical components of any business, as it allows us to personalize and customize our products for potential consumers. Yet, as important as data is, studies have shown that about 50‑70% of data collected by…
Handling Automatic ID Generation in PostgreSQL With Node.js and Sequelize
There are many ways to handle ID generation in PostgreSQL, but I’ve chosen to investigate these four approaches: Auto-incrementing (SERIAL data type) Sequence-caching Sequence-incrementing with client-side ID management UUID-generation Depending on your application and your underlying database tables, you might…
Choosing the Best Cloud Provider for Hosting DevOps Tools
DevOps has become extremely popular in recent years. As a result, companies are projected to spend nearly $58 billion on DevOps technology by 2030. Unfortunately, some companies have difficulty effectively managing their DevOps strategy because they lack the storage space…
The Role of Data Governance in Data Strategy: Part II
In the previous article, we discussed the importance and role of Data Governance in an organization. In this article, let’s see how BigID plays a vital role in implementing those concepts w.r.t Data Privacy, Security, and Classification. What Is BigID? How…
Revolutionizing Supply Chain Management With AI: Improving Demand Predictions and Optimizing Operations
In today’s rapidly changing business environment, staying ahead of the competition requires constant innovation and adaptation. Supply Chain Management, a domain that is constantly under stress, has seen significant advances in recent years through the use of artificial intelligence (AI).…