Category: DZone Security Zone

Testing Challenges Related to Microservice Architecture

If you are living in the same world as I am, you must have heard the latest coding buzzer termed “microservices”—a lifeline for developers and enterprise-scale businesses. Over the last few years, microservice architecture emerged to be on top of…

Deploy a Kubernetes Application With Terraform and AWS EKS

When it comes to infrastructure provisioning, including the AWS EKS cluster, Terraform is the first tool that comes to mind. Learning Terraform is much easier than setting up the infrastructure manually. That said, would you rather use the traditional approach…

Dynatrace Perform: Day Two

The second day of Dynatrace Perform kicked off with a great discussion between Kelsey Hightower, distinguished developer advocate at Google Cloud Platform, and Andi Grabner, DevOps evangelist at Dynatrace. The theme of their discussion was redefining the boundaries of people, processes, and…

How To Test IoT Security

Though the Internet of Things (IoT) has redefined our lives and brought a lot of benefits, it has a large attack surface area and is not safe until it is secure. IoT devices are an easy target for cybercriminals and…

Identity Federation and SSO: The Fundamentals

In many software organizations, terms like authentication, SSO, and SAML are heard pretty often. Admittedly, many people will run away when hearing these terms, trying to avoid doing any authentication-related work.  In this article, we will go over SSO fundamentals…

Security in Game Development

The gaming industry has seen tremendous growth in recent years, with millions of players engaging in online games daily. As the industry grows, so does the need for secure game development practices. Cyberattacks are becoming more sophisticated and frequent, making…

GKE Security: Top 10 Strategies for Securing Your Cluster

Security is one of the key challenges in Kubernetes because of its configuration complexity and vulnerability. Managed container services like Google Kubernetes Engine (GKE) provide many protection features but don’t take all related responsibilities off your plate. Read on to…

Backup Vs. Disaster Recovery: What Are the Key Differences?

Backup and disaster recovery are two critical components of a comprehensive data management strategy for businesses of all sizes. However, while both terms are often used interchangeably, they refer to two distinct processes. This article will examine the key differences…

Top 10 Resources for Learning Solidity

If you want to become a smart contract developer on Ethereum, then you need to learn Solidity. Whether your goal is DeFi, blockchain gaming, digital collectibles (NFTs), or just web3 in general, Solidity is the foundational language behind the innovative…

Open-Source Authorization as a Service

Background Information The story starts back in 2007 when our founders, Omri Gazitt and Gert Drapers, were working on what would eventually become Azure Active Directory. At that time, Active Directory was a keystone workload for Windows Server. It enabled…

How To Reduce the Impact of a Cloud Outage

Can you prevent a cloud outage from negatively impacting your business? It isn’t always possible to anticipate cloud outages, but there are steps you can take to minimize their impact on your team. How can you get started preparing for…

GraphQL vs Protobuf: Differences, Similarities, and Uses

Both GraphQL and Protocol Buffers (Protobuf) are types of formats for transferring data between client and server. Each has its own set of advantages and disadvantages, and are used in different contexts, depending on the specific requirements of an application.…

Security in Game Development

The gaming industry has seen tremendous growth in recent years, with millions of players engaging in online games daily. As the industry grows, so does the need for secure game development practices. Cyberattacks are becoming more sophisticated and frequent, making…

Identity Federation and SSO: The Fundamentals

In many software organizations, terms like authentication, SSO, and SAML are heard pretty often. Admittedly, many people will run away when hearing these terms, trying to avoid doing any authentication-related work.  In this article, we will go over SSO fundamentals…

How to Debug Websites Using Safari Developer Tools

Safari is the default browser on iPads, Macbooks, and iPhones. It lies second on browser preferences, right after Chrome. Its 250+ features offer users striking benefits that set it apart from other most popular browsers like Chrome and Firefox. Building on that,…

Decentralized Data Mesh With Apache Kafka in Financial Services

Digital transformation requires agility and fast time to market as critical factors for success in any enterprise. The decentralization with a data mesh separates applications and business units into independent domains. Data sharing in real-time with data streaming helps provide…

Data Engineering Practices to Avoid

Data engineers are increasingly in high demand, especially as more company leaders realize it’s necessary to use reliable information for better decision-making. However, even the most skilled and experienced professionals can make mistakes. Here are some of them and how…

Powering Manufacturing With MLOps

Machine learning is one of the most disruptive technologies across industries today. Despite this versatility and potential, many organizations struggle to capitalize on this technology’s full potential, especially in sectors like manufacturing that lack widespread ML skills and knowledge. High…

Generative AI for DevOps: A Practical View

The concept of generative AI describes machine learning algorithms that can create new content from minimal human input. The field has rapidly advanced in the past few years, with projects such as the text authorship tool ChatGPT and realistic image creator DALL-E2…

The Evolution of Cloud-Native Authorization

Authentication in the Age of SaaS and Cloud Let’s start with the differences between authentication and authorization. People tend to lump these concepts together as auth, but they’re two distinct processes. Authentication describes the process of finding out that you are…

Securing the Clouds: An Evaluation of Cloud Security Solutions

Cloud security is an ever-evolving challenge, as organizations must consider the security of the cloud provider, the configuration of the services they offer, and the security of their own internal systems that store and access cloud-based data. Organizations must continuously…

Which Type of MFA Is Most Secure?

More and more people are adopting multi-factor authentication today to protect themselves from increasing rates of hacking and data theft. Several popular options are available for MFA, but which is the most secure and effective?  1. Social Media Login One…

What Is Browser Sandboxing?

With a rapidly changing business landscape, security is one of the biggest challenges for developers and testers in their modern web development cycle. The complexity of building and deploying modern web apps leads to more security vulnerabilities. As per a…

Securing Admin Access to Apache APISIX

API Gateways are critical components in one’s infrastructure. If an attacker could change the configuration of routes, they could direct traffic to their infrastructure. Consequences could range from data theft to financial losses. Worse, data theft could only be noticed…

How to Secure Your Website in 10 Easy Steps

A website for your business is essential for reaching a wider audience and establishing a solid online presence. However, security should be a top priority when creating a website to protect your business and customers from cyber threats.  Securing a…

Data Privacy From a Data Governance Standpoint

Data governance (DG) is the process of managing the availability, usability, integrity, privacy, and security of the data in enterprise systems based on internal data standards and policies that also control data usage. Effective data governance ensures that data is…

GraphQL vs REST: Differences, Similarities, and Why To Use Them

Modern applications allow us to get connected to the world like never before. However, how is this structure so effective in providing a robust connection between different applications and data sharing between different devices? API (Application Programming Interface) allows developers…

Introduction to Kubernetes Event-Driven Auto-Scaling (KEDA)

Manual scaling is slowly becoming a thing of the past. Currently, autoscaling is the norm, and organizations that deploy into Kubernetes clusters get built-in autoscaling features like HPA (Horizontal Pod Autoscaling) and VPA (Vertical Pod Autoscaling). But these solutions have…

How To Use MQTT in Golang

Golang is a statically, strongly typed, compiled, concurrent, and garbage-collecting programming language developed by Google. Go is expressive, clean, and efficient. Its concurrency mechanism makes it easy to write programs that maximize the use of multicore and network machines, and…

What Is an API Integration Example?

An API integration is the code that allows one system to transfer data to or from another system while using an API (application programming interface) to securely access the system. Some API integrations may only have an API on one…

Securing the Clouds: An Evaluation of Cloud Security Solutions

Cloud security is an ever-evolving challenge, as organizations must consider the security of the cloud provider, the configuration of the services they offer, and the security of their own internal systems that store and access cloud-based data. Organizations must continuously…

What Is Browser Sandboxing?

With a rapidly changing business landscape, security is one of the biggest challenges for developers and testers in their modern web development cycle. The complexity of building and deploying modern web apps leads to more security vulnerabilities. As per a…

Application Mapping: 5 Key Benefits for Software Projects

Application Dependency Mapping is the process of creating a graphical representation of the relationships and dependencies between different components of a software application. This includes dependencies between modules, libraries, services, and databases. It helps to understand the impact of changes…

Data Privacy From a Data Governance Standpoint

Data governance (DG) is the process of managing the availability, usability, integrity, privacy, and security of the data in enterprise systems based on internal data standards and policies that also control data usage. Effective data governance ensures that data is…

The Role of Cloud-Native Security in Application Delivery

One of the commonly noticed challenges with companies adopting cloud-native architectures and a container-driven development journey is that they are not clear about why they’re choosing the path. Now, this might surprise you because organizations are investing a lot of…

How to Create a Dockerfile?

Docker is a powerful tool for creating, deploying and running container applications. A Dockerfile is a script that contains instructions for building a Docker image. It is used to automate the process of creating a container image so that developers…

13 Code Quality Metrics That You Must Track

Speed has become the new currency in this fast-paced digital world. Customers expect services to be delivered at high speed, and businesses that meet this demand have a significant edge in the market. And DevOps has empowered businesses to deliver…

Deduplication and Data Stewardship Process in MDM

Data Deduplication in MDM In master data management, often the same data is duplicated across several departments, which can harm the business. That’s why data deduplication is necessary to maintain an accurate master data record. It includes the removal of…

9 Ways You Can Improve Security Posture

Cyber threats are growing exponentially, both in volume and sophistication. A major portion of these threats can go unidentified, or they are detected too late for an organization to avoid data breaches or other related risks. The tangible costs of…

Development Platform for Data Protection

The 48th IT Press Tour had the opportunity to attend a private screen event with HYCU, where Simon Taylor, CEO, and Founder, introduced their solution to securing SaaS applications and data. HYCU exists to eliminate data silos and provide end-to-end data…

Remote Debugging Dangers and Pitfalls

This is the last part of the debugging series. To learn the rest, you’ll need to get the book “Practical Debugging at Scale: Cloud Native Debugging in Kubernetes and Production” or the course. One of the most frequently asked questions…

Introduction to Azure Data Lake Storage Gen2

Built on Azure Blob Storage, Azure Data Lake Storage Gen2 is a suite of features for big data analytics. Azure Data Lake Storage Gen1 and Azure Blob Storage’s capabilities are combined in Data Lake Storage Gen2. For instance, Data Lake…

The New DevOps Performance Clusters

In 2022, the Accelerate State of DevOps Report contained a few surprises. One was a change to the traditional performance clusters. The report also introduced a new way to group organizations using an extra dimension. This post introduces you to…

Microsoft Azure Key Vault Service

One of Azure’s key management options, Azure Key Vault, aids in the following issues’ resolution. Secrets Management: Tokens, passwords, certificates, API keys, and other secrets can be securely stored and access to them can be tightly controlled using Azure Key…

Writing a Modern HTTP(S) Tunnel in Rust

Learn how to write performant and safe apps quickly in Rust. This post guides you through designing and implementing an HTTP Tunnel, and covers the basics of creating robust, scalable, and observable applications. Rust: Performance, Reliability, Productivity About a year…

Top Three Docker Alternatives To Consider

Docker is a containerization technology that allows developers to package and deploy applications in lightweight, portable containers. These containers are isolated from the host operating system, which makes them portable across different environments and eliminates the “works on my machine”…

DevSecOps Benefits and Challenges

Performing AST (Application Security Testing) is a common and effective way to find vulnerabilities and weaknesses in an application and make it resistant to security threats. However, traditionally, AST has been performed at the end of the software/application development process,…

The Data Leakage Nightmare in AI

Nowadays, we think of artificial intelligence as the solution to many problems and as a tool that can help humanity achieve huge things faster and with less effort. Of course, those thoughts are not far from being true, but it…

SAST: How Code Analysis Tools Look for Security Flaws

Here we’ll discuss how SAST solutions find security flaws. I’ll tell you about different and complementary approaches to detecting potential vulnerabilities, explain why each of them is necessary, and how to turn theory into practice. SAST (Static Application Security Testing)…

9 Ways You Can Improve Security Posture

Cyber threats are growing exponentially, both in volume and sophistication. A major portion of these threats can go unidentified, or they are detected too late for an organization to avoid data breaches or other related risks. The tangible costs of…

Development Platform for Data Protection

The 48th IT Press Tour had the opportunity to attend a private screen event with HYCU, where Simon Taylor, CEO, and Founder, introduced their solution to securing SaaS applications and data. HYCU exists to eliminate data silos and provide end-to-end data…

Remote Debugging Dangers and Pitfalls

This is the last part of the debugging series. To learn the rest, you’ll need to get the book “Practical Debugging at Scale: Cloud Native Debugging in Kubernetes and Production” or the course. One of the most frequently asked questions…

Introduction to Azure Data Lake Storage Gen2

Built on Azure Blob Storage, Azure Data Lake Storage Gen2 is a suite of features for big data analytics. Azure Data Lake Storage Gen1 and Azure Blob Storage’s capabilities are combined in Data Lake Storage Gen2. For instance, Data Lake…

The New DevOps Performance Clusters

In 2022, the Accelerate State of DevOps Report contained a few surprises. One was a change to the traditional performance clusters. The report also introduced a new way to group organizations using an extra dimension. This post introduces you to…

Writing a Modern HTTP(S) Tunnel in Rust

Learn how to write performant and safe apps quickly in Rust. This post guides you through designing and implementing an HTTP Tunnel, and covers the basics of creating robust, scalable, and observable applications. Rust: Performance, Reliability, Productivity About a year…

Hackerman [Comic]

This article has been indexed from DZone Security Zone Read the original article: Hackerman [Comic]

The 12 Biggest Android App Development Trends in 2023

The world of Android app development is constantly evolving, and staying up-to-date with the latest trends is essential for businesses and developers alike. As an Android App Development Company, it’s important to stay ahead of the curve and offer the…

The Data Leakage Nightmare in AI

Nowadays, we think of artificial intelligence as the solution to many problems and as a tool that can help humanity achieve huge things faster and with less effort. Of course, those thoughts are not far from being true, but it…

DevSecOps Benefits and Challenges

Performing AST (Application Security Testing) is a common and effective way to find vulnerabilities and weaknesses in an application and make it resistant to security threats. However, traditionally, AST has been performed at the end of the software/application development process,…

SAST: How Code Analysis Tools Look for Security Flaws

Here we’ll discuss how SAST solutions find security flaws. I’ll tell you about different and complementary approaches to detecting potential vulnerabilities, explain why each of them is necessary, and how to turn theory into practice. SAST (Static Application Security Testing)…

Top Authentication Trends to Watch Out for in 2023

The internet has become one of the most critical sectors for business communications, and businesses have been transforming it into a reliable customer acquisition channel.  With that being said, companies are also facing opportunities to build reputations and establish relationships…

An Introduction to Data Mesh

As more and more teams have started to look for solutions that can help them unlock the full potential of their systems and people, decentralized architectures have started to become more and more popular. Whether it’s cryptocurrencies, microservices, or Git,…

How to Secure Your CI/CD Pipeline

Recently, we learned of a breach of CircleCI. They strongly suggest that all their customers: Immediately rotate any and all secrets stored in CircleCI. Review internal logs for their systems for unauthorized access from December 21, 2022, through January 4,…

A Brief Overview of the Spring Cloud Framework

The concept of distributed applications is certainly not new. Whoever has a long IT career certainly remembers a number of different technologies implementing distributed components even in the early years. Nowadays, is all about microservices. They are a new form…

Easy Smart Contract Debugging With Truffle’s Console.log

If you’re a Solidity developer, you’ll be excited to hear that Truffle now supports console logging in Solidity smart contracts. While Truffle has long been a leader in smart contract development tooling—providing an easy-to-use environment for creating, testing, and debugging…

Choosing the Best Cloud Provider for Hosting DevOps Tools

DevOps has become extremely popular in recent years. As a result, companies are projected to spend nearly $58 billion on DevOps technology by 2030.  Unfortunately, some companies have difficulty effectively managing their DevOps strategy because they lack the storage space…

The Role of Data Governance in Data Strategy: Part II

In the previous article, we discussed the importance and role of Data Governance in an organization. In this article, let’s see how BigID plays a vital role in implementing those concepts w.r.t Data Privacy, Security, and Classification. What Is BigID? How…