For developers, engineers, and architects, turning raw data into actionable insights has long been a complex and time-consuming challenge. But Sigma Computing is on a mission to change that with its innovative cloud-native data analytics platform built on Snowflake. “Snowflake…
Category: DZone Security Zone
Securing the Future: The Role of Post-Quantum Cryptography
As they evolve, quantum computers will be able to break widely used cryptographic protocols, such as RSA and ECC, which rely on the difficulty of factoring large numbers and calculating discrete logarithms. Post-quantum cryptography (PQC) aims to develop cryptographic algorithms…
Effortless Credential Management in Azure: The Power of Managed Identities
Azure Entra Id, formerly Azure Active Directory is a comprehensive Identity and Access Management offering from Microsoft. While it encompasses many functionalities, the article will focus on Managed Identities. Why Managed Identities? Initially, Azure resources were accessed using connecting strings–keys…
Exploring the Role of Data Analytics in SOC Alert Tuning
Security Operations Centers (SOCs) play a crucial role in detecting, responding to, and mitigating security threats in an increasingly complex threat landscape. One fundamental aspect of SOC efficiency is the tuning of alerts to ensure accurate and timely threat detection…
Smart Network Onboarding: Revolutionizing Connectivity With AI and Automation
Network onboarding — the process through which new devices gain access to an organization’s network— is a cornerstone of IT operations, affecting everything from security to user satisfaction. Traditionally, this process has been fraught with challenges, particularly at scale. In environments…
Revolutionizing API Security in the Era of GenAI: An Architect’s Perspective
As a seasoned security architect, I have witnessed the transformative impact of AI and ML on the software development landscape, particularly in the context of API security. The advent of GenAI, with its ability to rapidly generate code and entire…
Why Choose Bug Bounty Programs? (Benefits and Challenges Explained)
Diligent software developers must follow secure development practices, industry standards, and regulatory requirements when handling software vulnerabilities. Handling vulnerabilities is a complex, multi-step process that involves various methods and stages. One effective approach to finding vulnerabilities is through Bug Bounty…
Analysis of Flubot Malware on Android OS
Every day, the use of smartphones increases, together with the advancement of the operating system of Android. Subsequently, there have been reports of malicious individuals and hackers capitalizing on the exploits that Android has to offer to gain access to…
Embracing Responsible AI: Principles and Practices
Today we use AI to offer simpler solutions to intricate problems in various sectors such as education, transportation, finance, and healthcare. Due to this reason, it is very important to adhere to best practices and standards. Adhering to AI principles…
Mocking Dependencies and AI Is the Next Frontier in Vue.js Testing
Vue.js is a popular JavaScript framework, and as such, it is crucial to ensure that its components work as they are supposed to: effectively, and more importantly, reliably. Mocking dependencies is one of the most efficient methods of testing, as…
Dependency Injection
Dependency Injection is one of the foundational techniques in Java backend development, helping build resilient and scalable applications tailored to modern software demands. DI is used to simplify dependency management by externalizing dependencies from the class itself, streamlining code maintenance,…
Protecting PII Data With JWT
The Challenge JWT tokens are widely used for securing APIs through authentication and authorization. When an API request arrives, the resource server decodes and verifies the JWT token, typically validating the signature for authentication and checking claims or scopes for…
Security Considerations When Building SaaS
There is no well-defined pattern or framework for building a managed SaaS. Building a well-managed SaaS involves solving a wide variety of problems. Some of these problems are common across different kinds of SaaS, and some are very specific to…
New Ways for CNAPP to Shift Left and Shield Right: The Technology Trends That Will Allow CNAPP to Address More Extensive Threat Models
Editor’s Note: The following is an article written for and published in DZone’s 2024 Trend Report, Cloud Native: Championing Cloud Development Across the SDLC. The cloud-native application protection platform (CNAPP) model is designed to secure applications that leverage cloud-native technologies. However,…
Enhancing Vehicle Routing Problems With Deep Reinforcement Learning and Metaheuristics
The Vehicle Routing Problem (VRP) is a fundamental challenge in logistics and supply chain management, involving the optimization of routes for a fleet of vehicles to deliver goods to a set of customers. The problem’s complexity increases with the number…
Empowering Developers With Scalable, Secure, and Customizable Storage Solutions
In today’s data-driven world, businesses face numerous challenges when it comes to storing, securing, and analyzing vast amounts of information. As a developer, engineer, or architect, finding the right storage solution that seamlessly integrates with your infrastructure while providing the…
Modern Digital Authentication Protocols
Digital authentication is no longer a new term in today’s technology-driven society. It is a critical security mechanism that helps to protect our cyberspace from various types of fraud and identity theft. It is used to enable electronic transactions that…
Getting Started With NCache Java Edition (Using Docker)
NCache Java Edition with distributed cache technique is a powerful tool that helps Java applications run faster, handle more users, and be more reliable. In today’s world, where people expect apps to work quickly and without any problems, knowing how…
Securing Cloud Storage Access: Approach to Limiting Document Access Attempts
In today’s digital age, cloud-hosted applications frequently use storage solutions like AWS S3 or Azure Blob Storage for images, documents, and more. Public URLs allow direct access to publicly accessible resources. However, sensitive images require protection and are not readily…
Role-Based Multi-Factor Authentication
Multi-factor authentication (MFA) is a method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism — typically at least two of the following categories: knowledge…