Generative AI (GenAI) is transforming businesses in nearly every industry, and cybersecurity is no exception. As a $30 billion global IT services firm, NTT Data is on the leading edge of harnessing generative AI while managing the risks. I recently…
Category: DZone Security Zone
Challenge Your Cybersecurity Systems With AI Controls in Your Hand
Since the inception of the internet, cyber security has been one of the prime points to ponder. Protecting computers, mobile devices, electronic systems, servers, networks, and data from nefarious attacks from cyber miscreants. Today, AI has become the epicenter of…
Navigating the Skies
This is an article from DZone’s 2023 Database Systems Trend Report. For more: Read the Report In today’s rapidly evolving digital landscape, businesses across the globe are embracing cloud computing to streamline operations, reduce costs, and drive innovation. At the…
Gossips on Cryptography: Part 1 and 2
In this blog series, We will learn about encryption and decryption basics in a very casual fashion. We will start discussing from origin of cryptography and then learn about modern techniques. One of the important and main techs in encryption…
Implementing Stronger RBAC and Multitenancy in Kubernetes Using Istio
Background of Multitenancy DevOps and solution architects often implement RBAC and multitenancy in their Kubernetes infrastructure to achieve isolation of workspace and allow authorized persons to access resources with least privilege resources. The implementation of RBAC and multitenancy can be…
Future Skills in Cybersecurity: Nurturing Talent for the Evolving Threatscape
As we stand at the precipice of an increasingly digitized world, the challenges of emerging cyber threats are becoming more complex. With 20 years of experience as a cybersecurity professional, I have seen this evolution firsthand. The need for skilled…
When To Boost Your Authentication Strategy: Signs for Security Enhancement
Authentication is undoubtedly one of the first encounters of a user when they land on your platform. Friction in the overall authentication process could be the reason for your users to switch to your competitors. A smooth authentication is the…
What Is Good Database Design?
This is an article from DZone’s 2023 Database Systems Trend Report. For more: Read the Report Good database design is essential to ensure data accuracy, consistency, and integrity and that databases are efficient, reliable, and easy to use. The design…
Understanding Europe’s Cyber Resilience Act and What It Means for You
IoT manufacturers in every region have a host of data privacy standards and laws to comply with — and Europe is now adding one more. The Cyber Resilience Act, or CRA, has some aspects that are simply common sense and…
BSidesAustin 2023: CyberSecurity In The Texas Tech Capital
Austin, Texas, is a city filled with music, vibrant nightlife, and some legendary BBQ. It is also one of the great tech hubs of the southern United States, home to a wide variety of tech innovators like Indeed, SolarWinds, and…
Nine Benefits of Offshore Software Development
In today’s highly competitive business landscape, staying ahead of the curve often means leveraging the expertise and resources available around the globe. Offshore software development has emerged as a strategic approach for companies looking to optimize their software development processes…
Information Security: AI Security Within the IoT Industry
As the digital age progresses, we find ourselves amidst numerous ways of transmitting and storing information. From the smart devices that indwell our homes to the advanced artificial intelligence systems powering industries, the intertwining of technology with our daily lives…
Top 7 Best Practices DevSecOps Team Must Implement in the CI/CD Process
Almost every organization has implemented CI/CD processes to accelerate software delivery. However, with this increased speed, a new security challenge has emerged. Deployment speed is one thing, but without proper software checks, developers may inadvertently introduce security vulnerabilities, leading to…
Rethinking Quality Assurance in the Age of Generative AI
Generative AI is enabling software developers to create more code much faster than before. For software quality test engineers entrusted with assuring that applications get released on time and without bugs, GenAI presents both a challenge and a solution for…
How To Secure Your CI/CD Pipelines With Honeytokens
In the realm of software development, Continuous Integration and Continuous Deployment (CI/CD) pipelines have become integral. They streamline the development process, automate repetitive tasks, and enable teams to release software quickly and reliably. But while CI/CD pipelines are a marvel…
Exploring the Evolution and Impact of Computer Networks
In today’s interconnected world, computer networks have become the backbone of modern communication and information exchange. They enable the seamless transmission of data, facilitate collaboration, and connect individuals and devices across the globe. This article delves into the evolution, components,…
Why Is SaaS Compliance Important?
In the dynamic landscape of the digital era, the significance of SaaS (Software as a Service) has escalated exponentially. As we venture into 2023, the emphasis on SaaS compliance has become a focal point for businesses globally. In this comprehensive…
How To Learn Secure Software Development Lifecycle (SDLC)
Secure software development is crucial to safeguarding sensitive data and protecting against cyber threats. Learning the ins and outs of the Secure Software Development Lifecycle (SDLC) is a fundamental step for anyone aspiring to become a proficient software developer. In…
The Promise and Peril of Generative AI for Cybersecurity
A recent panel discussion at Black Hat 2023, Generative AI: Security Friend or Foe?, provided insights into how generative AI models like ChatGPT could impact security teams. Kelly Jackson, Editor-in-Chief of Dark Reading, moderated the roundtable with cybersecurity leaders Josh…
Four Ways for Developers To Limit Liability as Software Liability Laws Seem Poised for Change
For many years, the idea of liability for defects in software code fell into a gray area. You can find debate about the topic going back and forth since at least the early 1990s. Throughout, software developers argued that they shouldn’t…