Category: DZone Security Zone

Exploring the Nexus Between DevSecOps and Cybersecurity

DevSecOps, short for Development, Security, and Operations, is an approach to software development that integrates security practices into the DevOps (Development and Operations) process. The main goal of DevSecOps is to ensure that security is an integral part of the…

Hiding Data in DB2

In this article, we’ll talk about fine-grained access control in DB2 – hiding data that is, in fact, present in the database, but should not be accessible to certain users. Fine-grained access control is usually done in the database itself…

Common Cybersecurity Threats and How To Protect Yourself

Cybersecurity threats are acts performed by people with hurtful expectations, whose objective is to take information, do harm or disrupt computing systems. Normal classes of cyber threats include malware, social engineering, man-in-the-middle (MitM) attacks, denial of service (DoS), and injection…

Safe Clones With Ansible

I started research for an article on how to add a honeytrap to a GitHub repo. The idea behind a honeypot weakness is that a hacker will follow through on it and make his/her presence known in the process.  My…

Cybersecurity: A Trojan Horse in Our Digital Walls?

The rapid advancement of artificial intelligence (AI) in cybersecurity has been widely celebrated as a technological triumph. However, it’s time to confront a less discussed but critical aspect: Is AI becoming more of a liability than an asset in our…

NIST AI Risk Management Framework: Developer’s Handbook

The NIST AI RMF (National Institute of Standards and Technology Artificial Intelligence Risk Management Framework) provides a structured framework for identifying, assessing, and mitigating risks associated with artificial intelligence technologies, addressing complex challenges such as algorithmic bias, data privacy, and…

The Noticeable Shift in SIEM Data Sources

SIEM solutions didn’t work perfectly well when they were first introduced in the early 2000s, partly because of their architecture and functionality at the time but also due to the faults in the data and data sources that were fed…

K8s Network Policy Automation in Falco Talon

Setting up robust network security in Kubernetes is a challenge that demands both precision and adaptability. NetworkPolicy offers the potential for highly specific network configurations, enabling or blocking traffic based on a comprehensive set of criteria. However, the dynamic nature…

Designing for Security

Security is an important aspect of any software application. Often, it is the least priority and is overlooked while designing a system. The main focus is emphasized on functional and non-functional requirements to design our system for end users. However,…

Security Considerations in Kubernetes

Kubernetes is a robust container orchestration technology that is extensively used for containerized application deployment, scaling, and management. While Kubernetes provides a number of capabilities for protecting containerized workloads, it is critical to understand and handle numerous security aspects in…