The Internet of Things stands as one of the most significant technological advancements of our time. These vast neural networks enable IoT devices to seamlessly connect the mundane and the sophisticated into the digital fabric of the internet. This range…
Category: DZone Security Zone
How To Use AzureSignTool to Sign Executables With Azure DevOps
AzureSignTool is a code-signing utility that organizations use to secure their software. This signing tool is compatible with all major executable files and works impeccably with all OV and EV code signing certificates. But, it’s mostly used with Azure DevOps…
Create a Registration API in 15 minutes
Allowing users to register in your app is one of those important things few know how to implement correctly. It requires knowledge about a whole range of complex things, that few software developers have time to study. In the video…
Unveiling the Power of NFC Technology: Transforming Connectivity in the Digital Era
In today’s fast-paced world, technology has become an integral part of our lives. Among the many innovations that have emerged, Near Field Communication (NFC) stands out as a game-changer. This revolutionary wireless communication technology offers a range of possibilities that…
Zero Trust in API Management
In our digital age, the role of APIs (Application Programming Interfaces) in business is more crucial than ever. These APIs allow companies to be innovative, grow quickly, and adapt their services. But, as much as APIs are vital, they also…
Hacking Protected Java-Based Programs
This article provides examples of hacking techniques that can help Java developers avoid vulnerabilities in their programs. It is not intended to train hackers but rather for naive developers who think that standard obfuscators will save them from their intellectual property…
Exploring the Security Risks of Large Language Models
According to a recent survey, 74% of IT decision-makers have expressed concerns about the cybersecurity risks associated with LLMs, such as the potential for spreading misinformation. The world of Artificial Intelligence (AI) is booming with new capabilities, mainly owing to…
Identity as a Service (IDaaS): The Future of Secure and Convenient Authentication
Managing identities and making sure that users can access various online services and platforms securely have become of utmost importance in our increasingly digital and interconnected world. Passwords and PINs, which are common forms of authentication, have been shown to…
Unlocking the Secrets of Data Privacy: Navigating the World of Data Anonymization, Part 1
In today’s data-driven world, ensuring individual data privacy has become critical as organizations rely on extensive data for decision-making, research, and customer engagement. Data anonymization is a technique that transforms personal data to safeguard personal information while maintaining its utility.…
Why Is Automation Testing Required for an Application? Know About Advantages of Automation Testing
In today’s fast-paced software development landscape, ensuring the quality and reliability of applications is paramount. This is where automation testing services come into play. In this comprehensive guide, we’ll explore why automation testing is essential for applications and delve into…
Key Aspects of API Evolution: Version Control in Multi-Environments With API7 Enterprise
In the rapidly evolving landscape of software systems in today’s digital era, API version control has emerged as a critical strategy to ensure the robust evolution of systems. Particularly in multi-environment scenarios, effective management and tracking of API changes become…
How To Use Artificial Intelligence to Optimize DevOps
DevOps and AI make an inseparable pair and impact businesses of all kinds. While DevOps enables speedy product development and easier maintenance of existing deployments, AI transforms the overall system functionality. The DevOps team can rely on artificial intelligence and…
Unveiling the Power of Helidon 4: A Dive Into New Features
In the ever-evolving landscape of microservices development, Helidon has emerged as a beacon of innovation. The release of Helidon 4 brings forth a wave of enhancements and features that promise to redefine the way developers approach microservices architecture. In this…
The New Frontier in Cybersecurity: Embracing Security as Code
How We Used to Handle Security A few years ago, I was working on a completely new project for a Fortune 500 corporation, trying to bring a brand new cloud-based web service to life simultaneously in 4 different countries in…
Microservices Resilient Testing Framework
Resilience refers to the ability to withstand, recover from, or adapt to challenges, changes, or disruptions. As organizations increasingly embrace the microservices approach, the need for a resilient testing framework becomes important for the reliability, scalability, and security of these…
Secure Password Hashing in Java: Best Practices and Code Examples
In the domain of digital security, password hashing stands as a critical line of defense against unauthorized access. However, the landscape of hashing algorithms has evolved significantly, with some methods becoming obsolete and newer, more secure techniques emerging. This article…
Are the Fears About the EU Cyber Resilience Act Justified?
On Wednesday, July 19, the European Parliament voted in favor of a major new legal framework regarding cybersecurity: the Cyber Resilience Act (CRA). According to the press release following the vote: This article has been indexed from DZone Security Zone…
Anticipating the Journey: Launching Your First Open Source Project
I’ve been deeply immersed in the world of developer products for the past decade, and let me tell you, I’ve been quite an open-source enthusiast. Over the years, I’ve had the pleasure (and occasional pain) of shepherding open-source projects of…
Matching Algorithms in Dating Apps
Modern dating apps have long been a familiar part of our daily lives. Ten years ago, Tinder, Mamba, Pure, and others turned traditional ideas about dating and relationships upside down. Whether we like it or not, dating apps have started…
The Elusive Quest for DevSecOps Collaboration
Despite years of discussing DevSecOps, achieving security and development collaboration remains an uphill battle in most organizations. This article explores why real-world DevSecOps adoption lags behind expectations, common barriers faced, and how the Stream Security platform bridges visibility and policy…