Category: DZone Security Zone

How Data Encryption Can Simplify Infrastructure Architecture

Product and infrastructure engineering teams are not always aligned with the interests of security engineering teams. While product and infrastructure focus on driving business value and delivering practical solutions, security focuses on detection, prevention, and remediation, which can seem less…

Data Security Solution for US Federal Customers

Federal agencies manage highly classified sensitive data, including personal information, medical records, and tax and income details of all U.S. residents. In some cases, temporary visitor data are also retained. They also handle national security information, including susceptible documents, intergovernmental…

API Security: The Cornerstone of AI and LLM Protection

As artificial intelligence and large language models (LLMs) continue to reshape the technological landscape, the importance of API security has never been more critical. In a recent interview at Black Hat 2024, Tyler Shields, Vice President of Product Marketing at…

What Is SQL Injection and How Can It Be Avoided?

SQLi is one of the code injection techniques that may enable an attacker to modify the queries that the application provides to the database. By far the most frequent and severe web application security threats always hide in web applications that…

The Relationship Between Performance and Security

The software landscape has undergone a profound transformation over the past two decades. In the past, a substantial portion of software was designed for local desktop use. However, today, the norm for computer users is to access web-based software services…

Creating Effective Exceptions in Java Code [Video]

This article will explore the critical topic of creating effective exceptions in your Java code. Exceptions are crucial in identifying when something goes wrong during code execution. They are instrumental in managing data inconsistency and business validation errors. We will…

The Need for Application Security Testing

Security plays a key role whether you are onboarding customer workloads to the cloud, designing and developing a new product, or upgrading an existing service. Security is critical in every leg of the software development life cycle (SDLC). Application security…

How You Can Avoid a CrowdStrike Fiasco

By now we’ve all heard about —  or been affected by — the CrowdStrike fiasco. If you haven’t, here’s a quick recap. An update to the CrowdStrike Falcon platform, pushed on a Friday afternoon, caused computers to crash and be…

Why You Should Use Buildpacks Over Docker

Docker is the obvious choice for building containers, but there is a catch: writing optimized and secure Dockerfiles and managing a library of them at scale can be a real challenge. In this article, I will explain why you may…

Not All MFA Is Equal: Lessons From MFA Bypass Attacks

One-time passwords are one of the most relied-on forms of multi-factor authentication (MFA). They’re also failing miserably at keeping simple attacks at bay. Any shared secret a user can unknowingly hand over is a target for cybercriminals, even short-lived TOTPs.…

Reimagining AI: Ensuring Trust, Security, and Ethical Use

The birth of AI dates back to the 1950s when Alan Turing asked, “Can machines think?” Since then, 73 years have passed, and technological advancements have led to the development of unfathomably intelligent systems that can recreate everything from images…

How To Setup OAuth JWT in the Salesforce Connector

In this post, we’ll explain all the steps required to connect a Mule application to Salesforce using the Salesforce connector with the OAuth JWT flow. You can also create your own certificate for the OAuth JWT flow with Salesforce or…