Tag: DZone Security Zone

A Practical Guide to API Threat Analytics in Cloud Platforms

Any modern application is centered around APIs. They drive mobile applications, link business systems, and deliver new digital experiences. However, the convenience has its own risks — attackers often use APIs to break into systems. Basic security steps like authentication…

Blockchain-Based Authentication: The Future of Secure Identity Verification

Traditional authentication methods — passwords, centralized databases, and third-party identity providers — are plagued by security breaches, identity theft, and data privacy concerns. Blockchain-based authentication offers a decentralized, tamper-proof, and more secure alternative.   In this deep dive, we’ll explore:…

Secure Your Spring Boot Apps Using Keycloak and OIDC

In this blog, we will take a closer look at Spring Security, specifically in combination with Keycloak using OpenID Connect, all supported with examples and unit tests. Enjoy! Introduction Many applications are supported by means of authentication and authorization. However,…

Cloud Automation Excellence: Terraform, Ansible, and Nomad for Enterprise Architecture

Enterprise cloud architecture demands sophisticated orchestration of infrastructure, configuration, and workload management across diverse computing platforms. The traditional approach of manual provisioning and siloed tool adoption has become a bottleneck for organizations seeking cloud-native agility while maintaining operational excellence. This…

The Role of Data Governance in Data Strategy: Part 4

In the previous articles of this series, we explored the importance of data governance in managing enterprise data effectively (Part 1), how BigID supports data governance, particularly for data privacy, security, and classification (Part 2), and the role of Data…

CI/CD in the Age of Supply Chain Attacks: How to Secure Every Commit

The digital infrastructure we’ve built resembles a house of cards. One compromised dependency, one malicious commit, one overlooked vulnerability and the entire edifice comes tumbling down. In March 2024, security researchers discovered something terrifying: a backdoor lurking within XZ Utils,…

How to Use ALB as a Firewall in IBM Cloud

Do you have a use case where you want to implement a network firewall in IBM Cloud VPC that filters traffic based on hostname? For example, you may want to allow connections only to www.microsoft.com and www.apple.com, while blocking access…

Cry and Authenticate How AI is Changing Security

I constantly have thoughts buzzing in my head, and I need to throw them somewhere or they’ll just fly away. So I thought I’d write a few articles about how our lives are becoming more like the movies and games…

Blockchain, AI, and Edge Computing: Redefining Modern App Development

The overall landscape of app development is continuing with a transformative shift that is driven by various latest technologies, including AI or artificial intelligence, edge computing, and blockchain. These innovations are enhancing the efficiency and functionality of the apps, catering…

Implementing Scalable IoT Architectures on Azure

The Internet of Things (IoT) comprises smart devices connected to a network, sending and receiving large amounts of data to and from other devices, which generates a substantial amount of data to be processed and analyzed.   Edge computing, a…

Building AI-Driven Anomaly Detection Model to Secure Industrial Automation

Introduction In modern industrial automation, security is a primary requirement to keep the regular operation of industrial connected devices without disruption. However, the rise of cyber risks also significantly impacts the industry’s sustainable operation. The evolving cyberattacks can affect the…

AI Data Security: Core Concepts, Risks, and Proven Practices

AI is everywhere now, and cybersecurity is no exception. If you’ve noticed your spam filter getting smarter or your bank flagging sketchy transactions faster, there’s a good chance AI is behind it. But the same tech that helps defend data…

Certificate Authorities: The Keystone of Digital Trust

TLDR: Certificate Authorities (CAs) are the ultimate trust brokers online, issuing the digital certificates that make secure web browsing, e-commerce, and confidential communications possible. This article breaks down what CAs do, the nuances of public and private trust, role of…

How to Create Ansible Users and Add Passwords

Managing users efficiently is a key part of automating system administration with Ansible. In this guide, you’ll learn how to create users, set passwords, add users to groups, and configure remote access using Ansible’s powerful tools.  What is the Ansible…

Securing Cloud Applications: Best Practices for Developers

Cloud computing offers unmatched scalability and flexibility, but it also introduces new security challenges. Developers must take proactive steps to secure applications, infrastructure, and sensitive data from cyber threats. In this tutorial, we will explore essential cloud security best practices…

The Kill Switch: A Coder’s Silent Act of Revenge

In the age of code dominance, where billions of dollars are controlled by lines of code, a frustrated coder crossed the boundary between protest and cybercrime. What began as a grudge became an organized act of sabotage, one that now…

How to Build ML Experimentation Platforms You Can Trust?

Machine learning models don’t succeed in isolation — they rely on robust systems to validate, monitor, and explain their behavior. Top tech companies such as Netflix, Meta, and Airbnb have invested heavily in building scalable experimentation and ML platforms that…

Development of System Configuration Management: Introduction

Series Overview This article is part 1 of a multi-part series: “Development of system configuration management.” The complete series: This article has been indexed from DZone Security Zone Read the original article: Development of System Configuration Management: Introduction

Data Mesh Security: How to Protect Decentralized Data Architectures

The rise of data mesh architectures redefines how modern organizations have approached the concept of data security. Standard best practices dictate that data should be centralized, allowing it to be collected, stored, and governed within monolithic systems, such as data…

Set Up OpenID Connect With Keycloak: A Step-by-Step Guide

In this blog, you will learn how to set up the OpenID Connect Authorization Code Flow using Keycloak. You will execute the flow yourself in order to get a better understanding of OIDC. Enjoy! Introduction Adding security to your application…

The Developer’s Guide to Cloud Security Career Opportunities

Your organization’s entire infrastructure moved to the cloud last year, but your security team is still thinking like it’s 2015. They’re applying traditional network security controls to cloud environments, creating bottlenecks that slow down your deployments and leave massive security…

Federated Identity: The Modern Approach to Cloud Security and Automation

In the rapidly evolving landscape of cloud automation and multi-cloud strategies, the secure handling of sensitive data, particularly credentials, has emerged as a paramount concern. Traditional methods of storing long-lived credentials, whether in configuration files, CI/CD pipelines, or dedicated secret…

Why Most IaC Strategies Still Fail (And How to Fix Them)

Infrastructure as Code (IaC) was supposed to solve the chaos of cloud operations. It promised visibility, governance, and the ability to scale infrastructure with confidence. But for many teams, the reality is far from ideal.  Instead of clarity and control,…

Secure Microservices in Java: Cloud-Native Design With Zero Trust Architecture

Microservices enable modern application architecture in today’s fast-changing digital world. They break apps into smaller, deployable services, and this accelerates development, improves scalability, and increases flexibility.  Cloud computing’s capabilities for distributed systems and containerized settings make this step vital, contributing…

Why Data Privacy Without Context Will No Longer Work in 2026

The comfort zone of anonymization is breaking. For years, enterprises have limited their privacy goals to surface-level techniques of anonymization. Techniques such as Mask PII, which obfuscate identifiers and others, are often assumed to ensure compliance without thorough execution. And…

Building a Modern Data Platform That Delivers Real Business Value

Data modernization is a strategic endeavor that transforms the way organizations harness data for value creation. It involves adopting innovative approaches in terms of accessibility, governance, operations, and technology, typically centered around modern cloud architectures. This transformation is not limited…

Software Supply Chain Security Regulations From a DevSecOps Perspective

Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Software Supply Chain Security: Enhancing Trust and Resilience Across the Software Development Lifecycle. High-profile software supply chain attacks like SolarWinds, Log4j, and MOVEit highlight the…

How to Expose IBM FS Cloud Container App to Public

Are you looking for a way to expose your containerized applications to the internet without breaking compliance with IBM Cloud for Financial Services? This guide walks through how to do just that. It shows how to securely expose your apps…

Practical Steps to Secure the Software Supply Chain End to End

Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Software Supply Chain Security: Enhancing Trust and Resilience Across the Software Development Lifecycle. The software supply chain has rapidly evolved into a critical vulnerability point…

AI-Powered Ransomware and Malware Detection in Cloud Environments

Cloud platforms have become prime targets for ransomware and malware attacks, which can paralyze businesses by encrypting data or exfiltrating sensitive information. Traditional security tools such as signature-based antivirus and rule-based systems often struggle to detect advanced threats that mutate…

The Cybersecurity Blind Spot in DevOps Pipelines

Speed kills. In software development, that axiom has never been more literal. DevOps pipelines surge through modern enterprises like digital bloodstreams — pumping code, configurations, and deployments at breakneck velocity. Continuous integration and continuous delivery are the promises of rapid…

Modernize Your IAM Into Identity Fabric Powered by Connectors

It’s no secret that technology is evolving much faster than our traditional Identity and Access Management systems can handle. These legacy systems were designed for simpler times, when everything was hosted locally and security was perimeter-based. So, in an era…

Zero-Trace Paradigm: Emerging Technologies in Personal Data Anonymization

Emerging technologies like homomorphic encryption and zero-knowledge proofs can definitely help organizations approach zero-trace personal data anonymization. These and similar techniques can bring datasets to a near-zero-trace status, even achieving it in limited cases. There’s a major force that’s acting…

Self-Supervised Learning Techniques

Visual tracking systems are essential for applications ranging from surveillance to autonomous navigation. However, these systems have a significant Achilles’ heel: they rely heavily on large, labeled datasets for training. This reliance makes it challenging to deploy them in real-world…

Microservice Madness: Debunking Myths and Exposing Pitfalls

Microservice is the false belief that adding a message broker to your app will somehow magically make it faster and more scalable. Ignoring the fact that this is, in itself, an oxymoron—and that your app quite literally becomes two billion…

CRITICAL_PROCESS_DIED: How to Fix This Windows Blue Screen Error

CRITICAL_PROCESS_DIED is a notorious Windows error that triggers the dreaded Blue Screen of Death (BSOD), often leaving users frustrated and unsure of how to proceed. This error typically indicates that a critical system process has unexpectedly terminated, causing Windows to…

Blockchain in Healthcare: Enhancing Data Security and Interoperability

Abstract: Healthcare systems around the world are at a critical juncture, navigating the pressures of digital transformation, rising cybersecurity threats, and fragmented data landscapes. While the volume of healthcare data grows exponentially, the capacity to manage it securely and effectively…

Multi-Channel Notification Patterns for Security-Critical Events

As the degree of account takeovers and unauthorized access attempts continues to be more and more sophisticated, the time to notify users about security-critical situations has become a vital issue. The moment when a system becomes aware of irregular behavior…

Essential Steps to Building a Robust Cybersecurity Team

Cybersecurity doesn’t fail because someone forgot to patch a server. It fails because no one asked the right questions early enough, and because the wrong people were trusted to find the answers. Most companies start building a cybersecurity team only…

Automating E2E Tests With MFA: Streamline Your Testing Workflow

In software development, efficiency and security are key, especially for applications that require multi-factor authentication (MFA). MFA enhances security but complicates automated testing, particularly for key business processes like logins or transaction validations.  Altering testing environments to handle MFA differently…

Kubernetes Admission Controllers: Your First Line of Defense

Kubernetes Admission Controllers are a powerful but often overlooked security mechanism. Acting as gatekeepers, they intercept API server requests before objects are persisted in etcd, allowing you to enforce custom policies or inject configurations automatically. Whether it’s blocking privileged containers…

AI/ML Big Data-Driven Policy: Insights Into Governance and Social Welfare

Data-driven policy refers to the practice of using data, analytics, and empirical evidence to inform and guide government decision-making, moving beyond reliance on intuition or anecdotal information. Governments must be agile, transparent, and resilient in their decision-making. The convergence of…

Unveiling Supply Chain Transformation: IIoT and Digital Twins

Digital twins and IIoTs are evolving technologies that are transforming the digital landscape of supply chain transformation. The IIoT aims to connect to actual physical sensors and actuators. On the other hand, DTs are replica copies that virtually represent the…

Your Kubernetes Survival Kit: Master Observability, Security, and Automation

Kubernetes has become the de facto standard for orchestrating containerized applications. As organizations increasingly embrace cloud-native architectures, ensuring observability, security, policy enforcement, progressive delivery, and autoscaling is like ensuring your spaceship has enough fuel, oxygen, and a backup plan before…

Essential Cybersecurity Practices for Non-Profits

With an ever connected and globalized world, it is not surprising that cybersecurity attacks are on the rise. The repercussions of persistent cybersecurity attacks touch all types of organizations regardless of scale, from huge international companies to small local non-profits…

How to Master a DevSecOps Pipeline that Devs and AppSec Love

When you became a developer, you didn’t imagine you’d be spending a big chunk of your time parsing vulnerability reports, getting stuck in security review cycles, or rerunning CI jobs because the pipeline flagged a dozen “critical issues,” half of…

Secure DevOps in Serverless Architecture

Serverless computing, app development, and deployment have been completely revolutionized by its unparalleled scalability and cost efficiency. Infrastructure management abstraction, which is provided by serverless platforms like AWS Lambda, Google Cloud Functions, and Azure Functions, allows developers to concentrate on…