Tag: DZone Security Zone

Modern Best Practices for Web Security Using AI and Automation

Beyond being a cliché, “artificial intelligence” and its associated automation technologies have driven major developments in security, signifying that important changes have occurred in this field. In the field of cybersecurity, artificial intelligence refers to systems that acquire data, trace…

Why Security Scanning Isn’t Enough for MCP Servers

The Gap Nobody Is Talking About The Model Context Protocol (MCP) is quickly becoming the de facto standard between AI agents and the tools they use. The adoption is growing rapidly – from coding assistants to enterprise automation platforms, MCP servers are replacing…

From SAST to “Shift Everywhere”: Rethinking Code Security in 2026

Several structural shifts have changed how source code security is approached. Software teams now deploy continuously, build on cloud-native architectures, and often depend on third-party and open-source components. As a result, security vulnerabilities propagate faster and across wider blast radii. Security expectations…

Zero Trust, Build High Scale TLS Termination Layer

Let me tell you about the TLS termination system I built. We needed to support custom domains at scale, which meant HAProxy handling thousands of certificates and terminating TLS for high-traffic services. The old playbook was simple: decrypt at the…

Extending Java Libraries with Service Loader

When designing a Java library, extensibility is often a key requirement, especially in the later phases of a project. Library authors want to allow users to add custom behavior or provide their own implementations without modifying the core codebase. Java…

Infrastructure as Code Is Not Enough

When Infrastructure as Code Stops Solving the Problem Infrastructure as Code changed the industry for the better. For the first time, infrastructure could be reviewed, versioned, and deployed with the same discipline as application code. Teams moved faster, environments became…

Probabilistic Data Structures for Software Security

We are living in an era where software systems are growing in size with each passing day and often face a constant tension between the scale, performance, and security, where each of them is essential and non-negotiable. Security tools must…

Why Your “Stateless” Services Are Lying to You

The architecture diagram shows clean rectangles. “Stateless API tier,” someone wrote in Lucidchart, then drew an arrow to a managed database. The presentation went well. Everyone nodded. Six months later, after the third incident where a rolling deployment dropped active…