In this article, we will learn how to add user authentication with OAuth providers in your Next.js app. To do so, we’ll be using NextAuth.js, which is a user authentication solution that simplifies the whole process and has built-in support…
Category: DZone Security Zone
Tutorial for Building an Ethereum DApp With Integrated Web3 Monitoring
This post walks through the steps to creating a simple Ethereum DApp using Web3.js and Truffle and setting up monitoring of the API transactions sent to the blockchain. This article also provides an explanation of various pieces of technology involved…
Cybersecurity and AI Deep in the Heart of Texas Cyber Summit
Austin, Texas, is the 10th largest city in the US and is constantly growing, both in population and in industry. Every year, dozens of major companies either relocate or expand into the Austin area. It is also home to six…
Empowering Cyber Security by Enabling 7 Times Faster Log Analysis
This is about how a cyber security service provider built its log storage and analysis system (LSAS) and realized 3X data writing speed, 7X query execution speed, and visualized management. Log Storage and Analysis Platform In this use case, the…
Security Vulnerabilities in CasaOS
As part of our continuous effort to improve our Clean Code technology and the security of the open-source ecosystem, our R&D team is always on the lookout for new 0-day security vulnerabilities in prominent software. We recently uncovered two critical…
The Journey of Becoming a Blockchain Developer
Blockchain solutions are becoming more popular, signaling a rising demand for professionals who develop these systems. Just six to eight years ago, the role of a blockchain developer was relatively obscure. Today, you can find these professionals networking in dedicated…
Secure Your Web Applications With Facial Authentication
For the last three decades, web technology has remained relevant due to its versatile nature and wide range of applications in building solutions. The web runs virtually everything, from simple blog sites to complex and scalable web-based ERP systems in…
The Power of Resource-Oriented Programming in Cadence: A Deep Dive
Flow is a permissionless layer-1 blockchain built to support the high-scale use cases of games, virtual worlds, and the digital assets that power them. The blockchain was created by the team behind CryptoKitties, Dapper Labs, and NBA Top Shot. One…
Practical Routes to Healthy Culture
< article> The recent release of the Accelerate State of DevOps Report has once again highlighted the value of organizational culture. If you create a generative culture with high trust and low blame, you’ll receive a 30% boost to your…
18 Software Development Trends and Predictions 2024
The need for thorough risk assessments, continuous testing, and compliance checks before full-scale deployments is unavoidable. The future of software development demands businesses to be gearing up for a delicate dance between innovation and reliability. This year, we saw enthusiasm…
Secrets Management Takes More Than Just Tools
Every company wants to have a good security posture, and most are investing in security tooling. According to Gartner, worldwide spending on security is forecast to grow 11.3% in 2023 to reach more than $188.3 billion. However, despite all this…
Introducing Jira Security: Best Practices for Protecting Your Data
There is no doubt that Jira is one of the most popular project management and issue-tracking tools for organizations. It provides a great number of benefits to teams, including improved collaboration between technical and non-technical teams, increased visibility, enhanced productivity,…
Authentication at the Network Edge
In order to protect themselves in a growing attack landscape, companies must employ defensive security techniques and evaluate if they’re doing enough to prevent bad actors from accessing their networks. In this post, we’ll discuss types of authentication that allow…
Bridging the Gap: Better Token Standards for Cross-chain Assets
Taking ERC20 tokens cross-chain is broken. Today, bridges are often slow and expensive, have security vulnerabilities (as evidenced most recently by the Multichain hack), and fragment liquidity when each bridge creates its own version of the bridged token liquidity (and…
Securing Kubernetes: Don’t Underestimate the Risk Posed by Misconfigurations
Deployed by more than 60% of organizations worldwide, Kubernetes (K8s) is the most widely adopted container-orchestration system in cloud computing. K8s clusters have emerged as the preferred solution for practitioners looking to orchestrate containerized applications effectively, so these clusters often…
Why Granular, Scalable Control Is a Must for Every CTO
Robust and agile security frameworks are crucial for any organization. With the shift towards a microservices architecture, a more refined, granular level of access control becomes imperative due to the increased complexity, distribution, and autonomy associated with individual service operations.…
Should You Always Use a Service Mesh?
The service mesh has become popular lately, and many organizations seem to jump on the bandwagon. Promising enhanced observability, seamless microservice management, and impeccable communication, service mesh has become the talk of the town. But before you join the frenzy,…
A Comprehensive Look at Hardware Components in a Cloud Computing Data Center
In order to provide computational resources and services over the internet, a cloud computing data center is a complex infrastructure that combines different hardware components. In this thorough overview, we will look at the various hardware parts that are frequently…
From Ransomware to Ransom Nations: Everything You Need to Know About State-Sponsored Cyberattacks
In a world where the click of a mouse can be as powerful as a nuclear button, the evolution of cyber threats has taken a sinister turn. What was once a digital nuisance in the form of ransomware has now…
A Look at the Future of Supply Chain and National Security: Updates From CISA and NIST
The world of cyber threats is continually evolving, and the range of targets is constantly expanding. Fortunately, cybersecurity is rapidly progressing as well. In August 2023, two different U.S. government organizations published new reports about what to expect moving ahead,…