Category: DZone Security Zone

Securing Your CI/CD: An OIDC Tutorial

Let’s start with a story: Have you heard the news about CircleCI’s breach? No, not the one where they accidentally leaked some customer credentials a few years back. This time, it’s a bit more serious. It seems that some unauthorized…

Zero Trust Architecture: Enterprise Infrastructure

Importance of Security in Financial Institutions Security in financial institutions is of paramount importance due to the highly sensitive nature of the data they handle. These institutions hold vast amounts of personal and financial information of their customers, making them…

Fencing in Distributed Systems: Twitter’s Approach

Fencing is a crucial technique used in distributed systems to protect shared resources and maintain system stability. It involves isolating problematic nodes or preventing them from accessing shared resources, ensuring data integrity and overall system reliability. In this article, we…

Five Key Considerations for Building DeFi APIs

Decentralized Finance (DeFi) is a financial service based on ledgers, just like the ones used by cryptocurrencies. In the U.S., DeFi technology challenges the current centralized finance system by empowering individuals to manage their own financial exchanges via a crypto…

How Global Tenanted Deployments Would Look Without Automation

Continuous Integration and Continuous Delivery’s recommendation of deployment automation is hugely important for organizations with complex software. That’s especially true for multi-tenancy software delivered with tenanted deployments. But what if we didn’t have deployment automation? How would tenanted deployments even…

Data Anonymization in Test Data Management

The potential for data analytics to unlock economic opportunities is immense; however, as this potential expands, it also gives rise to new privacy challenges. Data anonymization is a crucial technique in this landscape, ensuring that sensitive information is removed or…

Types of Edge ML and Enterprise Use Cases

In the ever-evolving landscape of artificial intelligence (AI), one of the most exciting advancements is the integration of Edge Machine Learning (Edge ML). This revolutionary technology empowers devices to perform AI-driven tasks locally, on the edge, rather than relying solely…

Preventing SQL Injection Attacks With DbVisualizer

SQL injection attacks are a major threat to database security, and they can result in data breaches, loss of sensitive information, or even complete system compromise. As a database administrator or developer, it’s essential to understand the risks associated with…

Unlocking Data Insights and Architecture

This is an article from DZone’s 2023 Data Pipelines Trend Report. For more: Read the Report Data management is an ever-changing landscape, but throughout its history, a few use cases have driven most of the value and hence the majority…

Function’s Anatomy and Beyond

Writing clean, understandable, easy-to-support, and maintain code is hard and requires many years of experience. At least we’re used to thinking this way. What if there is a way to write such a code consciously and without spending years and…

Backend For Frontend (BFF) Pattern

What is BFF? The Backend for Frontend (BFF) design pattern involves creating a backend service layer specifically tailored to the requirements of a particular frontend application or a set of closely related frontends. While traditionally this approach has been contrasted…

Modern Data Backup Strategies for Safeguarding Your Information

In a rapidly changing business environment, data backup strategies for small and large organizations have evolved beyond traditional methods. Data ecosystems’ growing complexity and potential risks highlight the need for comprehensive data backup and recovery strategies. Many organizations experience data…

DevOps and Platform Engineering

In this post, you discover where Platform Engineering fits into your broader software delivery process. You see how Platform Engineering works with a DevOps process and why both DevOps and Platform Engineering can help your organization attain high performance. The…

Safeguard Your AWS Account: IAM Best Practices

Amazon Web Services (AWS) provides extensive cloud computing services. These services equip businesses with the flexibility, scalability, and reliability necessary for their operations. Security becomes a paramount concern as organizations shift their activities to the cloud. The AWS Identity and…

What Is Web App Penetration Testing?

It is also known as web app pen-testing or security testing, which is an organized evaluation of a web application’s security to identify exposure and debility that could be exploited by malicious performers. The main goal of penetration testing is…

Simplifying Blockchain Development by using Abstraction

Blockchain has the potential to revolutionize the way we interact with the digital world. It promises security, transparency, and decentralization. However, for most people, getting started with blockchain can be confusing and intimidating. The need to manage private keys and…

Multi-Tenancy With Keycloak, Angular, and SpringBoot

To propose an implementation, we will present a use case that allows us to define the requirements. We will describe the functional and technical context in which we will operate and then specify the requirements. Based on these requirements, we…

SwiftData Dependency Injection in SwiftUI Application

Most of the examples Apple provides to demonstrate Dependency Injection in SwiftUI use @Environment. When creating a new project with SwiftData in XCode, you’ll notice that the template uses Environment for injecting the modelContext. Swift   struct ContentView: View {…

What You Must Know About Rate Limiting

Rate limiting is the concept of controlling the amount of traffic being sent to a resource. How can you achieve this control? By means of a rate limiter – a component that lets you control the rate of network traffic…

Modbus Protocol: The Grandfather of IoT Communication

The Modbus protocol is a communication protocol that allows devices to communicate over various types of media, such as serial lines and ethernet. It was developed in 1979 by Modicon, a company that produced Programmable Logic Controllers (PLCs), to enable…

Unlocking the Secrets of DevSecOps: The Essential Lifecycle Stages

Organizations today are constantly seeking ways to deliver high-quality applications faster without compromising security. The integration of security practices into the development process has given rise to the concept of DevSecOps—a methodology that prioritizes security from the very beginning rather…

Navigating the Skies

This is an article from DZone’s 2023 Database Systems Trend Report. For more: Read the Report In today’s rapidly evolving digital landscape, businesses across the globe are embracing cloud computing to streamline operations, reduce costs, and drive innovation. At the…

Gossips on Cryptography: Part 1 and 2

In this blog series, We will learn about encryption and decryption basics in a very casual fashion. We will start discussing from origin of cryptography and then learn about modern techniques. One of the important and main techs in encryption…

What Is Good Database Design?

This is an article from DZone’s 2023 Database Systems Trend Report. For more: Read the Report Good database design is essential to ensure data accuracy, consistency, and integrity and that databases are efficient, reliable, and easy to use. The design…

Nine Benefits of Offshore Software Development

In today’s highly competitive business landscape, staying ahead of the curve often means leveraging the expertise and resources available around the globe. Offshore software development has emerged as a strategic approach for companies looking to optimize their software development processes…

Information Security: AI Security Within the IoT Industry

As the digital age progresses, we find ourselves amidst numerous ways of transmitting and storing information. From the smart devices that indwell our homes to the advanced artificial intelligence systems powering industries, the intertwining of technology with our daily lives…

Rethinking Quality Assurance in the Age of Generative AI

Generative AI is enabling software developers to create more code much faster than before. For software quality test engineers entrusted with assuring that applications get released on time and without bugs, GenAI presents both a challenge and a solution for…

How To Secure Your CI/CD Pipelines With Honeytokens

In the realm of software development, Continuous Integration and Continuous Deployment (CI/CD) pipelines have become integral. They streamline the development process, automate repetitive tasks, and enable teams to release software quickly and reliably. But while CI/CD pipelines are a marvel…

Exploring the Evolution and Impact of Computer Networks

In today’s interconnected world, computer networks have become the backbone of modern communication and information exchange. They enable the seamless transmission of data, facilitate collaboration, and connect individuals and devices across the globe.  This article delves into the evolution, components,…

Why Is SaaS Compliance Important?

In the dynamic landscape of the digital era, the significance of SaaS (Software as a Service) has escalated exponentially. As we venture into 2023, the emphasis on SaaS compliance has become a focal point for businesses globally. In this comprehensive…

How To Learn Secure Software Development Lifecycle (SDLC)

Secure software development is crucial to safeguarding sensitive data and protecting against cyber threats. Learning the ins and outs of the Secure Software Development Lifecycle (SDLC) is a fundamental step for anyone aspiring to become a proficient software developer. In…

The Promise and Peril of Generative AI for Cybersecurity

A recent panel discussion at Black Hat 2023, Generative AI: Security Friend or Foe?, provided insights into how generative AI models like ChatGPT could impact security teams. Kelly Jackson, Editor-in-Chief of Dark Reading, moderated the roundtable with cybersecurity leaders Josh…

DevSecOps: Integrating Security Into Your DevOps Workflow

The need for speed, agility, and security is paramount in the rapidly evolving landscape of software development and IT operations. DevOps, focusing on collaboration and automation, has revolutionized the industry. However, in an era where digital threats are becoming increasingly…

Breach and Attack Simulation Technology (Short Version)

The ever-evolving cybersecurity landscape presents growing challenges in defending against sophisticated cyber threats. Managing security in today’s complex, hybrid/multi-cloud architecture compounds these challenges. This article explores the importance of demonstrating cybersecurity effectiveness and the role of Breach and Attack Simulation…

How To Validate Archives and Identify Invalid Documents in Java

In our contemporary cybersecurity landscape, sneaky custom content threats are beginning to penetrate our email security policies and firewalls/virus-scanning network proxies with greater consistency. Aptly disguised files can easily wind their way into our inboxes and our most sensitive file…

UX Is Critical for Zero-Trust

Implementing a zero-trust framework is essential to any website’s security — everything must be verified and authenticated. It ensures data integrity and prioritizes safety for everyone involved, especially the users. The Relationship Between UX and Security Prioritizing security and nothing…

Next-Gen Threat Hunting Techniques With SIEM-SOAR Integration

In the constantly shifting realm of cybersecurity, remaining ahead of emerging threats is no longer merely an aspiration but an imperative. With cyber adversaries continuously enhancing their skills and tenacity, businesses are progressively embracing cutting-edge technologies and inventive tactics to…

Why You Shouldn’t Test on Rooted Devices

“Mobile is becoming not only the new digital hub but also the bridge to the physical world.”– Thomas Husson, VP and Principal Analyst at Forrester Research Mobile devices have become an inevitable part of organizations’ strategies to do more with…

Securing Your Applications With Spring Security

In today’s increasingly digital world, securing your applications has become paramount. As developers, we must ensure that our applications are protected from unauthorized access and malicious attacks. One popular solution for securing Java applications is Spring Security, a comprehensive and…

What Is Privacy by Design?

Privacy by Design (PbD) is an approach to systems engineering that aims to embed privacy into every stage of the development process and across the entire organization from day one. Privacy is too often overlooked or solely an afterthought. Policies…

The Promise of Personal Data for Better Living

Emerging technologies are unlocking new possibilities for gathering and leveraging data from personal devices to provide highly customized and contextualized user experiences. As Dr. Poppy Crum, CTO, and neuroscientist, highlighted in her Technology and Human Evolution presentation at TIBCO Next,…

Gradle Version Catalogs on Android

Gradle version catalogs allow us to add and maintain dependencies in an easy and scalable way. Apps grow, and managing projects with several development teams increases the compilation time. One potential solution to address this issue involves segmenting the project…

Spring Authentication With MetaMask

When choosing a user authentication method for your application, you usually have several options: develop your own system for identification, authentication, and authorization, or use a ready-made solution. A ready-made solution means that the user already has an account on…

Why GraphQL API Security Is Unique

Enterprise security teams have had since 2015 to familiarize themselves with GraphQL API security. But many — if not most — still haven’t captured the security nuances of the popular open-source query language. Simply understanding GraphQL’s processes and vulnerable attack…

The Top Cybersecurity Risks in Agile Software Development

Agile software development has transformed how software is created and delivered. It fosters collaboration, flexibility, and quick development cycles, making it appealing to many teams. However, Agile’s numerous advantages come with specific cybersecurity risks that developers must address. In this…

Protect Your Keys: Lessons from the Azure Key Breach

On July 11, 2023, Microsoft released details of a coordinated attack from threat actors, identified as Storm-0558. This state-sponsored espionage group infiltrated email systems in an effort to collect information from targets such as the U.S. State and Commerce Departments.…

Identity and Access Management Best Practices

Identity and access management (IAM) is fundamental to modern cybersecurity and operational efficiency. It allows organizations to secure their data, comply with regulations, improve user productivity, and build a strong foundation for trustworthy and successful business operations. A robust IAM…

Best Practices To Secure Data Transmission

In today’s interconnected global marketplace, secure data transmission is more crucial than ever. As digital platforms become increasingly important for financial transactions and personal communications, ensuring the integrity and confidentiality of data is vital. If someone gets unauthorized access to…

Implementing Zero-Trust in Enterprise Environments

In the face of ever-changing threats and complex infrastructures, the zero-trust architecture represents an important transformation in our understanding and implementation of security. This innovative approach promises not only increased protection but also increased adaptability and efficiency in infrastructure management.…

Unveiling Vulnerabilities via Generative AI

Code scanning for vulnerability detection for exposure of security-sensitive parameters is a crucial practice in MuleSoft API development.  Code scanning involves the systematic analysis of MuleSoft source code to identify vulnerabilities. These vulnerabilities could range from hardcoded secure parameters like…

One-Click Deploying EMQX MQTT Broker on AWS Using Terraform

MQTT is a lightweight messaging protocol commonly used in IoT (Internet of Things) applications to enable communication between devices. As a popular open-source MQTT broker, EMQX provides high scalability, reliability, and security for MQTT messaging. By using Terraform, a widespread…

One-Click Deploying EMQX MQTT Broker on Azure Using Terraform

MQTT is a lightweight messaging protocol used in the Internet of Things (IoT) to enable communication between devices. As a popular open-source MQTT broker, EMQX provides high scalability, reliability, and security for MQTT messaging. By using Terraform, a widespread Infrastructure…

Creating a Custom Starter With Spring Boot 3

Starters are an integral part of the Spring Boot application. In addition to dependency versioning, they provide the ability to describe the configuration for a particular functionality. They gained their popularity due to the development of microservice architecture. When we…

How To Check Office Files for Macros Using Java

The Microsoft OpenXML files we use on a day-to-day basis are conveniently designed to be accessed and manipulated programmatically. We can jump into any OpenXML file structure in a variety of capacities (usually via specialized programming libraries or APIs) to…

CockroachDB TIL: Volume 13

Previous Articles Volume 1 Volume 2 Volume 3 Volume 4 Volume 5 Volume 6 Volume 7 Volume 8 Volume 9 Volume 10 Volume 11 Volume 12 Topics Topic 1: Diagnose certificate-based authentication Topic 2: Differences between cockroach and psql clients…

Applications and SaaS Plugins: Data Exfiltrations

Since most security administrators have little insight into cloud-to-cloud connections, monitoring and protecting data throughout these communications is challenging. This article will examine the issue and potential remedies.  What Exactly Is a ‘Plug-In’ in a SaaS System? A plug-in SaaS…

Harnessing Security by Adopting Zero Trust Architecture

Over the past several years, Zero Trust Architecture (ZTA) has gained increased interest from the global information security community. Over the years, several organizations have adopted Zero Trust Architecture (ZTA) and experienced considerable security improvements. One such example is Google,…