Welcome back to this series where we have been learning how to build web applications with AI. So far in this series, we’ve created a working app that uses AI to determine who would win in a fight between two…
Category: DZone Security Zone
Five Best Data De-Identification Tools To Protect Patient Data and Stay Compliant
Data de-identification is a necessary exercise healthcare institutions and organizations dealing with personally identifiable information must implement. With the help of data de-identification software, it has become easier to mask personal data that can put an individual at risk. De-identifying…
SIEM Volume Spike Alerts Using ML
SIEM stands for Security Information and Event Management. SIEM platforms offer centralized management of security operations, making it easier for organizations to monitor, manage, and secure their IT infrastructure. SIEM platforms streamline incident response processes, allowing security teams to respond…
Pinterest’s Transition to HTTP/3: A Boost in Performance and Reliability
In a recent announcement, Pinterest revealed its successful migration from HTTP/2 to HTTP/3. This marked a significant improvement in its networking infrastructure. The aim was to enhance the user experience and improve critical business metrics by leveraging the capabilities of…
Rethinking Data Governance: Metrics for Meaningful Outcomes
For years, data governance has been obsessed with a metric that feels more like accounting than strategic decision-making: coverage. Data Governance tool vendors educated a generation of governance professionals to diligently track the percentage of documented data, chasing a completion…
Device and Data Security in Embedded Systems
Embedded systems are at the core of our modern-age technology, powering everything from smart electronic devices to connected applications. These systems have become crucial in various industries enabling advanced applications. However, the security of these devices has become a major…
NFT Wallets Unleashed: A Data Structures and Application Design Journey
Whether or not you’re caught up in the NFT hype, as a software engineer, staying abreast of recent innovations is crucial. It’s always fascinating to delve into the technologies underpinning such trendy features. Typically, I prefer to let the dust…
Edge Security for IoT: Protecting Data at the Edge
The Internet of Things (IoT) has rapidly expanded the landscape of connected devices, revolutionizing industries ranging from healthcare to manufacturing. However, as the number of IoT devices continues to grow, so do the security challenges. One crucial aspect of IoT…
Data Governance and DevOps
In the age of information, “data is treasure.” With trillions of datasets encapsulating the world, data is fragile. Safeguarding data is imperative, and data governance ensures data is managed, safe, and in compliance. Data Governance Data governance overlooks data. It…
Simplifying Access: The Role of Single Sign-On (SSO) in Cloud Computing
Cloud computing has transformed how businesses access and manage their data and apps. With the growing complexity of cloud-based ecosystems, faster access and increased security are critical. Single Sign-On (SSO) becomes a game changer in this situation. We will look…
TPM Chips and the Use of TPM in Virtualization Technology
The Trusted Platform Module (TPM) is an important component in modern computing since it provides hardware-based security and enables a variety of security features. TPM chips have grown in relevance in both physical and virtual contexts, where they play a…
Securing the Digital Frontier
In an era where digitalization permeates every facet of our lives, the interplay between technology, society, and regulations becomes increasingly critical. As we navigate through a world brimming with data, understanding the evolving landscape of data protection is not just…
How To Implement Supply Chain Security in Your Organization
In the ever-evolving landscape of digital innovation, the integrity of software supply chains has become a pivotal cornerstone for organizational security. As businesses increasingly rely on a complex web of developers, third-party vendors, and cloud-based services to build and maintain…
A Framework for Maintaining Code Security With AI Coding Assistants
Over the past few years, AI has steadily worked its way into almost every part of the global economy. Email programs use it to correct grammar and spelling on the fly and suggest entire sentences to round out each message. Digital…
Safeguarding Privacy: A Developer’s Guide to Detecting and Redacting PII With AI-Based Solutions
PII and Its Importance in Data Privacy In today’s digital world, protecting personal information is of primary importance. As more organizations allow their employees to interact with AI interfaces for faster productivity gains, there is a growing risk of privacy breaches and…
Monitoring Dynamic Linker Hijacking With eBPF
Extended Berkeley Packet Filter (eBPF) is a programming technology designed for the Linux operating system (OS) kernel space, enabling developers to create efficient, secure, and non-intrusive programs. Unlike its predecessor, the Berkeley Packet Filter (BPF), eBPF allows the execution of…
Securing the Digital Frontline: Advanced Cybersecurity Strategies for Modern Web Development
Websites and web applications are more than just digital interfaces; they are gateways through which sensitive data, personal information, and critical business operations flow. As such, ensuring their security is paramount. The landscape of cybersecurity is not static; it’s a…
Repository and Metadata Backup, Disaster Recovery, And Compliance: The Unbreakable Trio
Who said that there is no link between backup and compliance? Why should you have a compliant backup? What is more, why a Disaster Recovery is an inalienable part of a company’s compliance? What place here is given to Disaster…
Comprehensive Gun Detection for Schools: An AI-Based Approach Leveraging Audio and Video Insights
This article discusses a new approach to detecting guns in educational institutions by leveraging visual and auditory cues. The system below combines YOLOv7 for image recognition and pyAudioAnalysis for audio analysis to identify guns visually and discern gun-related sounds. The…
Building Secure Cloud Applications: A Developer’s Companion to NIST CSF
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) stands as a beacon of guidance for organizations navigating the intricate landscape of cybersecurity. In an era where cloud computing has become integral to software development, the fusion of…