Zero Trust is a well-known but ‘hard-to-implement’ paradigm in computer network security. As the name suggests, Zero Trust is a set of core system design principles and concepts that seek to eliminate the practice of implicit trust-based security. The core…
Category: DZone Security Zone
Outsmarting Cyber Threats: How Large Language Models Can Revolutionize Email Security
Email remains one of the most common vectors for cyber attacks, including phishing, malware distribution, and social engineering. Traditional methods of email security have been effective to some extent, but the increasing sophistication of attackers demands more advanced solutions. This…
Integration Testing With Keycloak, Spring Security, Spring Boot, and Spock Framework
In today’s security landscape, OAuth2 has become a standard for securing APIs, providing a more robust and flexible approach than basic authentication. My journey into this domain began with a critical solution architecture decision: migrating from basic authentication to OAuth2…
OpenID Connect Flows: From Implicit to Authorization Code With PKCE and BFF
This article will review the principles behind various OpenID Connect (OIDC) authentication flows, from the simplest to the most modern, highlighting the vulnerabilities present in each. We will explore each of the following OpenID Connect flows in detail: This article…
How To Plan a (Successful) MuleSoft VPN Migration (Part II)
In this second post, we’ll be reviewing more topics that you should take into consideration if you’re planning a VPN migration. If you missed the first part, you can start from there. This article has been indexed from DZone Security…
How To Plan a (Successful) MuleSoft VPN Migration (Part I)
You might need to migrate your MuleSoft legacy VPNs to Anypoint VPN. You might be changing your routing, from static to dynamic. Or maybe, you’re moving to Cloudhub 2.0. It doesn’t matter, you need to migrate your VPN. A VPN…
Data Governance: Data Integration (Part 4)
What Is Data Governance? Data governance is a framework that is developed through the collaboration of individuals with various roles and responsibilities. This framework aims to establish processes, policies, procedures, standards, and metrics that help organizations achieve their goals. These…
Shortened Links, Big Risks: Unveiling Security Flaws in URL Shortening Services
In today’s digital age, URL-shortening services like TinyURL and bit.ly are essential for converting lengthy URLs into short, manageable links. While many blogs focus on how to build such systems, they often overlook the security aspects. Here, we have threat-modeled…
The XZ Utils Backdoor in Linux: A Symptom of Ailing Security in the Software Supply Chain
The cybersecurity industry was once again placed on high alert following the discovery of an insidious software supply chain compromise. The vulnerability, affecting the XZ Utils data compression library that ships with major Linux distributions, is logged under CVE-2024-3094 and…
Cybersecurity Essentials for Software Developers
Software development is becoming complex, and a new approach is being used to create cross-functional hybrid teams. This means some developers work on-site while others develop parts of software code remotely. While this approach has benefited agility, speed, and scalability,…
Index Engines’ Cybersense Delivers Unparalleled Ransomware Detection With 99.99% Accuracy
In the face of an ever-evolving threat landscape, organizations are constantly seeking innovative solutions to bolster their cyber resilience. Index Engines, a leading cyber security company, has taken a significant step forward in this direction with the announcement of an industry-first…
Comprehensive Guide To Troubleshooting IPsec VPN Site-To-Site Connections With PSK on FortiGate Firewalls
Troubleshooting IPsec VPN Site-to-Site connections on a FortiGate firewall can be challenging due to the complex nature of VPN connections. Here’s a structured approach to diagnose and resolve common IPsec VPN problems between two sites: “Headquarter” and “Branch”. Topology This…
The Role of Kubernetes in Data Privacy and Protection
Kubernetes is a de facto platform for managing containerized applications. It provides a rich ecosystem for deployment, scaling, and operations with first-class support (tons of ready configs and documentation) on the Google Cloud platform. Given the growing importance of data…
Optimizing Your Cloud Resources, Part 1: Strategies for Effective Management
“Cloud resources” is a term that refers to various components and services available in cloud computing environments. On-demand scaling and flexible IT infrastructure are provided by cloud resources. To deploy and scale applications, and store and manage data, organizations leverage…
IoT Needs To Get Serious About Security
This headline came across my email the other day, and it really got me thinking: “Number of vulnerable IoT devices increases 136%” This article has been indexed from DZone Security Zone Read the original article: IoT Needs To Get Serious…
Transforming Modern Networking: The Unmatched Security of Secure Access Service Edge (SASE)
Secure Access Service Edge (SASE) enhances security by converging network and security services into a single, cloud-native architecture. The model is designed to meet the challenges of modern IT environments, with a rising tendency to use the cloud, mobile workforce,…
A Wake-up Call for Cloud Security: Insights From the Recent Snowflake Data Breach
Snowflake, a leading cloud data warehousing provider, has been impacted by a major data breach recently. This incident, which surfaced in June 2024, has sent ripples through the tech community, affecting prominent clients like Advance Auto Parts, Santander Bank, and…
Building Resilient Security Systems: Composable Security
Traditional cybersecurity measures may not be enough to protect organizations from new and emerging threats in today’s fast-paced digital world. Security systems need to be advanced along with technology and also should be flexible and adaptable. Composable security is an…
Unmasking the Danger: 10 Ways AI Can Go Rogue (And How to Spot Them)
The rapid advancement of large language models (LLMs) has ignited both excitement and apprehension. While their potential for good is immense, so too is the possibility of misuse and unintended consequences. Understanding the specific dangers these powerful AI systems pose…
Building an Internal TLS and SSL Certificate Monitoring Agent: From Concept to Deployment
Can you monitor your internal SSL certificates? This was a question we frequently heard from our clients. Many organizations keep their services (web, database, etc.) inaccessible on the public internet, for security, compliance, cost, and other reasons. At TrackSSL, we…