Category: DZone Security Zone

Automating Maven Dependency Upgrades Using AI

Enterprise Java applications do not often break due to business logic. The reason they break is that dependency ecosystems evolve all the time. Manual maintenance in most large systems consists of hundreds of third-party libraries, and small upgrades occur regularly…

Modern Best Practices for Web Security Using AI and Automation

Beyond being a cliché, “artificial intelligence” and its associated automation technologies have driven major developments in security, signifying that important changes have occurred in this field. In the field of cybersecurity, artificial intelligence refers to systems that acquire data, trace…

Why Security Scanning Isn’t Enough for MCP Servers

The Gap Nobody Is Talking About The Model Context Protocol (MCP) is quickly becoming the de facto standard between AI agents and the tools they use. The adoption is growing rapidly – from coding assistants to enterprise automation platforms, MCP servers are replacing…

From SAST to “Shift Everywhere”: Rethinking Code Security in 2026

Several structural shifts have changed how source code security is approached. Software teams now deploy continuously, build on cloud-native architectures, and often depend on third-party and open-source components. As a result, security vulnerabilities propagate faster and across wider blast radii. Security expectations…

Zero Trust, Build High Scale TLS Termination Layer

Let me tell you about the TLS termination system I built. We needed to support custom domains at scale, which meant HAProxy handling thousands of certificates and terminating TLS for high-traffic services. The old playbook was simple: decrypt at the…

Extending Java Libraries with Service Loader

When designing a Java library, extensibility is often a key requirement, especially in the later phases of a project. Library authors want to allow users to add custom behavior or provide their own implementations without modifying the core codebase. Java…