Category: DZone Security Zone

Database Security: Best Practices and What You Need to Know

In today’s rapidly evolving digital landscape, marked by the ascendancy of Artificial Intelligence (AI) and the ubiquity of cloud computing, the importance of database security has never been more pronounced. As databases increasingly become the backbone of AI algorithms and…

Threat Modeling

In an era where digital threats are constantly evolving, understanding and mitigating these risks is crucial for organizations of all sizes. Threat modeling emerges as a pivotal process in this landscape, offering a structured approach to identify, assess, and address…

Using Pen Tests to Protect Your Company From Digital Threats

Data breaches, system failures, bugs, and website defacement can seriously harm a company’s reputation and profits. Typically, companies realize the importance of auditing their infrastructure, evaluating established interaction patterns, and assessing the business logic of their services only after developing…

How to Build a Data Foundation for Generative AI

Since late 2022, generative AI has quickly demonstrated its value and potential to help businesses of all sizes innovate faster. By generating new media from prompts, generative AI stands to become a powerful productivity aid, multiplying the effect of creative…

Securing Applications in ROKS Cluster

In the dynamic landscape of cloud computing, ensuring the security of your applications is paramount. This is particularly true when dealing with a Red Hat OpenShift Kubernetes Service (ROKS) cluster, where applications may be exposed to the public internet. In…

What Do You Need to Know About DevOps Lifecycle Phases?

With technology always changing, the DevOps lifecycle has become a popular development disruptor. However, talking about how the lifecycle has transformed due to digitalization is also essential. Today, this blog investigates the significance of DevOps, its phases, potential future, and…

Revolutionizing Kubernetes With K8sGPT: A Deep Dive Into AI-Driven Insights

In the ever-evolving landscape of Kubernetes (K8s), the introduction of AI-driven technologies continues to reshape the way we manage and optimize containerized applications. K8sGPT, a cutting-edge platform powered by artificial intelligence, takes center stage in this transformation. This article explores…

Unleashing the Power of OAuth Authentication in Computing

Authentication is critical to the security of computing systems, applications, and data. OAuth, a free and open protocol, has emerged as a popular alternative for secure authorization and authentication. We go deep into the realm of OAuth authentication in computing…

The Role of Zero-Knowledge Proofs in LLM Chains for Data Privacy

In today’s digital age, data privacy has become a paramount concern for individuals and organizations alike. With the increasing amount of personal and sensitive information being stored and transmitted online, there is a growing need for robust security measures to…

Mastering Docker Networking Drivers: Optimizing Container Communication

Docker has transformed the world of containerization by providing a powerful platform for packaging, shipping, and running applications within containers. A key aspect of containerization is networking, and Docker offers a range of networking drivers to facilitate communication between containers…

Secure Your Secrets With .env

Using environment variables to store secrets instead of writing them directly into your code is one of the quickest and easiest ways to add a layer of protection to your projects. There are many ways to use them, but a…

Rethinking Threat Detection and Response in Cloud-Native Ecosystems

In highly dynamic cloud-native environments, the traditional Threat Detection and Response (TDR) approaches are increasingly showing their limitations. With its unique architecture and operational dynamics, Kubernetes demands re-evaluating how we handle security threats, particularly in the context of Endpoint Detection &…

Simplifying Kubernetes Deployments: An In-Depth Look at Helm

Kubernetes has significantly simplified the management and operation of containerized applications. However, as these applications grow in complexity, there is an increasing need for more sophisticated deployment management tools. This is where Helm becomes invaluable. As a Kubernetes package manager,…

Revolutionizing Commerce With AI: Trends and Predictions

Picture a future where commerce is not just an exchange of goods and services but an intricate relationship of data, insights, and artificial intelligence (AI). This is the new reality for product leaders in the digital age, where AI is…

What Is Compliance Monitoring for Remote Developers?

Compliance monitoring involves tracking remote employee activities to ensure they follow the rules and regulations set forth by companies and the industry. While most developers remain productive and conscientious in a work-from-home role, a few might abuse the privilege and…

Why Companies Are Moving Back to On-Premise From the Cloud

The past few years have made cloud computing an undisputed king of IT infrastructure in business. Companies flocked to the cloud for cost-efficiency, scalability, and flexibility. The online survey portals show that the cloud adoption rate among enterprise organizations is…

The Essential Guide To Effective Software Testing

Imagine that your organization has been exhaustively focused on developing a software product and is now eagerly anticipating the release of that product. However, as the launch day arrives, the reality of the product reveal is a disappointment because the…

Why We Need Cybersecurity Whistleblowers

The term “whistleblower” can carry wildly different connotations depending on who you’re talking to. While some see the practice as noble, others may associate it with disgruntled employees seeking revenge on their employers. Despite the potential controversy, whistleblowers are an…

Jakarta EE Security: Using Identity Stores

As one of the most important aspects of modern business applications and services, the security of the Java enterprise-grade applications didn’t wait for the Jakarta EE 10 outbreak. Starting from the first releases of J2EE in early Y2K, security was…

7 Tips for Effective Cybersecurity Training for Developers

Cybersecurity is an ever-present concern for organizations across all industries. Threat actors continually seek ways to infiltrate businesses and sell stolen data to the highest bidder. Using updated and relevant security knowledge, your software developers can be the first line…

The Exploration of Static vs Dynamic Code Analysis

In the realm of software development, ensuring the reliability, security, and efficiency of code is paramount. Two essential methodologies employed for this purpose are Static Code Analysis (SCA) and Dynamic Code Analysis (DCA). These approaches represent distinct strategies, each with…

7 Considerations for Multi-Cluster Kubernetes

In the IT space today, customers often intermix Multi-Cloud and hybrid-cloud terms without necessarily understanding the distinction between them. Understanding Hybrid and Multi-Cloud Environments A hybrid cloud is a cloud computing environment that combines public and private (typically on-premise) clouds, allowing…

Securing Infinispan With Keycloak

Infinispan and Keycloak in a Nutshell About Infinispan Infinispan is an open-source, in-memory distributed key/value data store. It is designed to provide fast and scalable access to frequently accessed data by storing it in memory. In addition to caching, Infinispan…

GCP to AWS Migration: A Comprehensive Guide

Migrating from one cloud platform to another can be a transformative decision for your business. As technology continues to evolve, businesses often find themselves evaluating their cloud service providers to ensure they are getting the best value, features, and performance. …

The Ultimate Guide To Securing Virtual Machines

Virtual machines (VMs) have become an essential component of many sectors in the digital era, providing flexibility, scalability, and cost-efficiency. The security of these virtualized environments, on the other hand, is critical. This article will guide you through the necessary…

12 Software Development Predictions for a Futuristic World

Predicting the future of software development trends is always a tough call. Why? Because emerging trends and frequent changes in the software development domain have always been expected to satisfy the market’s rising expectations. Such trends will also rule the…

Infinispan Insights: Security Basics and Secured Caches

Security in a Nutshell When we talk about security, there are two main things to consider: proving who you are (authentication) and deciding what you’re allowed to do (authorization). These tasks are managed by one or more security realms. Authentication…

Explore Redis for User Session Management on AWS Elasticache

In the bustling digital marketplace, web applications are like vibrant cities, constantly humming with activity as users come and go. Just as cities use various systems to keep track of their inhabitants and visitors, web applications rely on user session…

What Is OAuth 2.0?

OAuth 2.0 is an authorization framework that enables users to safely share their data between different applications. It is an industry standard that addresses the API security concerns associated with sharing user credentials while providing simple, well-defined authorization flows for…

AI and Cybersecurity in 2024: What’s Changing and Why It Matters

As 2024 unfolds, the cybersecurity landscape is witnessing a notable transformation, primarily driven by the increasing integration of artificial intelligence (AI). Here’s a deeper dive into what these changes entail and their significance in the cyber world. The New Regulatory…

IoT Security in the Age of Cyber Threats

The Internet of Things stands as one of the most significant technological advancements of our time. These vast neural networks enable IoT devices to seamlessly connect the mundane and the sophisticated into the digital fabric of the internet. This range…

How To Use AzureSignTool to Sign Executables With Azure DevOps

AzureSignTool is a code-signing utility that organizations use to secure their software. This signing tool is compatible with all major executable files and works impeccably with all OV and EV code signing certificates.  But, it’s mostly used with Azure DevOps…

Create a Registration API in 15 minutes

Allowing users to register in your app is one of those important things few know how to implement correctly. It requires knowledge about a whole range of complex things, that few software developers have time to study. In the video…

Zero Trust in API Management

In our digital age, the role of APIs (Application Programming Interfaces) in business is more crucial than ever. These APIs allow companies to be innovative, grow quickly, and adapt their services. But, as much as APIs are vital, they also…

Hacking Protected Java-Based Programs

This article provides examples of hacking techniques that can help Java developers avoid vulnerabilities in their programs. It is not intended to train hackers but rather for naive developers who think that standard obfuscators will save them from their intellectual property…

Exploring the Security Risks of Large Language Models

According to a recent survey, 74% of IT decision-makers have expressed concerns about the cybersecurity risks associated with LLMs, such as the potential for spreading misinformation. The world of Artificial Intelligence (AI) is booming with new capabilities, mainly owing to…

How To Use Artificial Intelligence to Optimize DevOps

DevOps and AI make an inseparable pair and impact businesses of all kinds. While DevOps enables speedy product development and easier maintenance of existing deployments, AI transforms the overall system functionality. The DevOps team can rely on artificial intelligence and…

Unveiling the Power of Helidon 4: A Dive Into New Features

In the ever-evolving landscape of microservices development, Helidon has emerged as a beacon of innovation. The release of Helidon 4 brings forth a wave of enhancements and features that promise to redefine the way developers approach microservices architecture. In this…

Microservices Resilient Testing Framework

Resilience refers to the ability to withstand, recover from, or adapt to challenges, changes, or disruptions. As organizations increasingly embrace the microservices approach, the need for a resilient testing framework becomes important for the reliability, scalability, and security of these…

Secure Password Hashing in Java: Best Practices and Code Examples

In the domain of digital security, password hashing stands as a critical line of defense against unauthorized access. However, the landscape of hashing algorithms has evolved significantly, with some methods becoming obsolete and newer, more secure techniques emerging. This article…

Are the Fears About the EU Cyber Resilience Act Justified?

On Wednesday, July 19, the European Parliament voted in favor of a major new legal framework regarding cybersecurity: the Cyber Resilience Act (CRA). According to the press release following the vote: This article has been indexed from DZone Security Zone…

Matching Algorithms in Dating Apps

Modern dating apps have long been a familiar part of our daily lives. Ten years ago, Tinder, Mamba, Pure, and others turned traditional ideas about dating and relationships upside down. Whether we like it or not, dating apps have started…

The Elusive Quest for DevSecOps Collaboration

Despite years of discussing DevSecOps, achieving security and development collaboration remains an uphill battle in most organizations. This article explores why real-world DevSecOps adoption lags behind expectations, common barriers faced, and how the Stream Security platform bridges visibility and policy…

Automate Your SSO With Ansible and Keycloak

The article Deploy Keycloak single sign-on with Ansible discussed how to automate the deployment of Keycloak. In this follow-up article, we’ll use that as a baseline and explore how to automate the configuration of the Keycloak single sign-on (SSO) server,…

Learning To Use Web3: First Impressions

Come along with me as I learn about blockchain and web3: the good, the bad, why it’s needed, how to learn it, and, in the end, if it’s really what it’s hyped up to be. Web3 is a new vision…

How To Protect RDP From Ransomware Attacks

Ransomware is a massive threat, and like all types of cybercrime, it’s always evolving. Consequently, you must learn what vulnerabilities are targeted to stay safe. Remote desktop protocol (RDP) is one of the most significant of those weaknesses today. What…

AI and Automation

This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report In recent years, developments in artificial intelligence (AI) and automation technology have drastically reshaped application security. On one hand, the progress in AI and…

Docker Image Building Best Practices

1. Start With a Minimal Base Image Starting with a basic, minimum image is essential when creating Docker images. This method minimizes security concerns while shrinking the image size. For basic base images, Alpine Linux and scratch (an empty base…

The Perils of AI Hallucination: Unraveling the Challenges and Implications

Artificial Intelligence (AI) has undeniably transformed various aspects of our lives, from automating mundane tasks to enhancing medical diagnostics. However, as AI systems become increasingly sophisticated, a new and concerning phenomenon has emerged – AI hallucination. This refers to instances…

The Art of Securing Cloud-Native Mobile Applications

This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report In the ever-evolving landscape of mobile applications, the seamless integration of cloud-native technologies has become a cornerstone for innovation, speed, and efficiency. As organizations…

Achieving Continuous Compliance

This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report If you’ve ever explored regulatory compliance and cybersecurity, you’ll understand the importance of continuous compliance in the digital age, where evolving technology and regulations…

Demystifying SAST, DAST, IAST, and RASP

This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report Effective application security relies on well-defined processes and a diverse array of specialized tools to provide protection against unauthorized access and attacks. Security testing…

Shared Platforms Explained: Navigating the Enterprise Ecosystem

In the world of enterprise technology, shared platforms like Kafka, RabbitMQ, Apache Flink clusters, data warehouses, and monitoring platforms are essential components that support the robust infrastructure leading to modern microservices architectures. We see shared platforms acting as mediators between…

Tired of Messy Code? Master the Art of Writing Clean Codebases

You’ve conquered the initial hurdle, learning to code and landing your dream job. But the journey doesn’t end there. Now comes the real challenge: writing good code. This isn’t just about functionality; it’s about crafting elegant, maintainable code that stands…

Data Governance: MDM and RDM (Part 3)

What Is Data Governance? Data governance is a framework that is developed through the collaboration of individuals with various roles and responsibilities. The purpose of this framework is to establish processes, policies, standards, and metrics that help organizations achieve their goals.…

Modern DevSecOps

This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report DevSecOps — a fusion of development, security, and operations — emerged as a response to the challenges of traditional software development methodologies, particularly the…

How To Implement Data Management Into Your AI Strategy

The first impression most of us have about AI is likely from the sci-fi movies where robots overpower humans. Remember the films like “Terminator” or novels like “Robopocalypse”? Given the pace of development in the space of AI, we are…

A Practitioner’s Guide to Security-First Design

This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report Today, safeguarding assets is not just a priority; it’s the cornerstone of survival. The lurking threats of security breaches and data leaks loom larger…

Does Your App Accept Digital Wallets?

Digital wallets are electronic systems that securely store payment information digitally. They make it easy to make electronic transactions online or in stores without using physical cards. Digital wallets are designed for convenience and often include security features to protect…

Unleashing the Power of GPT in Slack With React Integration

In the dynamic landscape of communication and collaboration, Slack has emerged as a powerful platform for teams to connect and work seamlessly. The integration of GPT (Generative Pre-trained Transformer) with Slack, powered by React, takes this collaboration to new heights.…

The Virtual Desktop Revolution: Redefining Work and Productivity

Virtual desktops, a recent technological advancement that has revolutionized the way people use and interact with their computers, have advanced technology. A virtual desktop, also referred to as a virtual desktop infrastructure (VDI), is a virtualized computing environment that enables…

Deploy Keycloak Single Sign-On With Ansible

In this article, you’ll use Ansible to simplify and automate the installation of Keycloak, a popular open-source tool to implement single sign-on for Web applications.  The tutorial in this article builds on an Ansible Collection named middleware_automation.keycloak, which has been…

The Playbook for Building Generative AI Applications

Generative AI (GenAI) tools powered by Large Language Models (LLM) are transitioning from a captivating vision to a tangible reality as businesses realize their potential for reshaping industries and fostering creativity. Its capabilities, from crafting engaging content to generating realistic…