In an era where cloud computing reigns supreme, the concept of security has undergone a profound transformation. As businesses rapidly migrate their operations and data to the cloud, the need to secure this digital frontier becomes increasingly paramount. Enter “Shift…
Category: DZone Security Zone
Platform Engineering Trends in Cloud-Native: Q&A With Ville Aikas
The rise of Kubernetes, cloud-native, and microservices spawned major changes in architectures and abstractions that developers use to create modern applications. In this multi-part series, I talk with some of the leading experts across various layers of the stack —…
Unlocking a Passwordless Future: The Case for Passkeys
Passwords have long outlived their usefulness, yet they stubbornly persist as the default for authentication. 61% of consumers believe passwords are inherently insecure, while 47% find them inconvenient and frustrating. With password reuse rampant and phishing on the rise, individuals…
Unlocking the Potential of Low-Code No-Code Development Platforms
Gartner forecasts that the low-code/no-code platforms market to grow in 2024 and revolutionize the world of enterprise architecture. This burgeoning technology is set to skyrocket in adoption, propelling businesses into a new era of efficiency and agility. It is a…
Understanding Zero Trust Security Building a Safer Digital World
In our rapidly evolving digital age where technology underpins almost every facet of our lives, cybersecurity has never been more critical. As the world becomes increasingly interconnected with personal devices and social networks to critical infrastructure and global business operations,…
Enhancing IoT Security: The Role of Security Information and Event Management (SIEM) Systems
The rapid growth of the Internet of Things (IoT) has revolutionized the way we connect and interact with devices and systems. However, this surge in connectivity has also introduced new security challenges and vulnerabilities. IoT environments are increasingly becoming targets…
Investigate Google Service Account Key Origins and Usage
Service accounts can pose a security risk for your Google Cloud project if not managed properly. Because they are often highly privileged, anyone who is able to authenticate as a service account can likely take sensitive actions in your environment.…
Beyond the Login Box: Okta Fuels Developer Innovation in Identity
The traditional username and password combo remains the go-to for most web and mobile authentication. But as Bhawna Singh, CTO of Okta Customer Identity Cloud, shared during the Developer Keynote at Oktane 23, “It’s time we move past it.” She…
Integrating Salesforce With Google BigQuery for Cortex Framework Deployment
In this document, I am going to put together a step-by-step process of connecting your Salesforce instance with Google BigQuery using Cloud Composer DAGs that are provided by Google Cortex Framework. Steps To Be Performed on the Salesforce Account For this…
Deliver Exceptional Digital Experiences and Unlock New Value With Okta Customer Identity
Customer identity is the new strategic battleground that forward-thinking companies must conquer to build trust, foster loyalty, and unlock new revenue in the digital-first era. As Shiven Ramji, President of Okta‘s Customer Identity Cloud, explained, “Customer identity is the first…
Going Beyond MFA: How Okta is Redefining Enterprise Identity
At Oktane23, Okta revealed new solutions to automate identity governance, implement privileged access management, and enable continuous authentication and threat protection. Introduction Identity has historically been regarded as the gateway to grant or deny access to an enterprise’s digital resources…
Oktane 2023: Okta Unveils New Identity Innovations To Secure the AI Era
At Oktane 23, Okta’s annual flagship conference, CEO Todd McKinnon and other executives introduced one of the company’s most ambitious identity and access management (IAM) roadmaps to date during the keynote Go Beyond with AI and Identity. With pressures in…
The Rise of Superclouds: The Latest Trend in Cloud Computing
Since the pandemic hit the world two years ago, cloud adoption has exploded. The majority of customers use multi-clouds, which are isolated silos, and each public cloud has its own management tools, operating environment, and development environment. Companies keep investing…
Service Mesh and Management Practices in Microservices
In the dynamic world of microservices architecture, efficient service communication is the linchpin that keeps the system running smoothly. To maintain the reliability, security, and performance of your microservices, you need a well-structured service mesh. This dedicated infrastructure layer is designed…
Why Quality Assurance Testers Are Essential in a Software Development Team
In the technology-driven era, users prefer convenience over complexity. That’s a fact, and we all are aware of it. When a startup or an entrepreneur creates a MindMap of their dream software, it may be free of errors and bugs…
Secure Schema Migrations With Flyway and CockroachDB Dedicated
Previous Articles on Schema Migrations and CockroachDB Migrating Feature Toggles With Unleash and CockroachDB Motivation A prospect was having issues with TLS and Flyway schema migrations, and since both topics are near and dear to my heart, I felt obligated…
Dual Pillars of Embedded Systems: Ensuring Safety and Security
In today’s interconnected digital age, embedded systems are ubiquitous, from household appliances to sophisticated industrial machines and medical devices. As these systems increasingly impact our daily lives and critical infrastructures, ensuring their safety and security has become paramount. In this…
Giving Power Back to Your Users With Flow’s Account Model
Many alternative blockchains that have emerged recently are classified as “EVM” chains, meaning they operate exactly like Ethereum but have a different execution layer. This helps the cross-compatibility of smart contracts across chains, but it doesn’t solve some of the…
Unlocking the Secrets of DevSecOps: The Essential Lifecycle Stages
Organizations today are constantly seeking ways to deliver high-quality applications faster without compromising security. The integration of security practices into the development process has given rise to the concept of DevSecOps—a methodology that prioritizes security from the very beginning rather…
Modbus Protocol: The Grandfather of IoT Communication
The Modbus protocol is a communication protocol that allows devices to communicate over various types of media, such as serial lines and ethernet. It was developed in 1979 by Modicon, a company that produced Programmable Logic Controllers (PLCs), to enable…