The Model Context Protocol (MCP), introduced in late 2024, is a significant move forward towards transforming the agentic AI revolution by providing a mechanism for them to connect with enterprise tools, APIs, and databases. The protocol presents a standardized way for large language models…
Tag: DZone Security Zone
Infrastructure as Code (IaC) in a Multi-Cloud Environment: Consistency and Security Issues
Relevance of the Study Modern organizations are increasingly turning to cloud technologies to improve the flexibility, scalability, and efficiency of their IT infrastructure. One important tool in this process is Infrastructure as Code (IaC), which allows organizations to describe their…
Unpack IPTables: Its Inner Workings With Commands and Demos
We all know that the internet works by sending and receiving small chunks of data called packets. Back in the early days, when the internet was still in its infancy, packets were allowed to transfer freely across a connected world,…
Policy-as-Code for Terraform in Regulated Environments
Why Does It Matter? When we talk about a regulated workload, we talk about compliance. These compliances are industry standards that govern how data is processed, stored, and managed. That is why these workloads need to be clean and should…
Implementing Governance on Databricks Using Unity Catalog
Data governance has historically been the least glamorous part of data engineering. Engineers thrive on building things, designing scalable pipelines, curating high-quality datasets, and enabling machine learning models that deliver real business impact due to business demands. Governance, on the…
Scoped Filtering: A Practical Bridge to RBAC
You’re a startup fresh out of your development-focused cycle, starting to gain traction and demo your product to potential clients. As someone working at a freshly minted Series A company, I understand the priority: get the product working. In our…
5 Manual Testing Techniques Every Tester Should Know
Despite rapid advancements in test automation and the use of AI in software testing, manual testing is still a fundamental part of software Quality Assurance in 2025. Recent data from multiple industry reports confirm the ongoing value of manual testing…
Federated Learning: Training Models Without Sharing Raw Data
As machine learning programs require ever-larger sets of data to train and improve, traditional central training routines creak under the burden of privacy requirements, inefficiencies in operations, and growing consumer skepticism. Liability information, such as medical records or payment history,…
Basic Security Setup for Startups
Preamble I recently had a conversation with my friend about starting a new company. We discussed the various stages a company should go through to become mature and secure enough to operate in the modern market. This article will outline…
Digital Experience Monitoring and Endpoint Posture Checks Usage in SASE
In this article, I will go through the concepts of digital experience monitoring (DEM) and Endpoint Posture Checks and discuss how these essential capabilities are integrated into the SASE framework to enforce the zero trust principle. Together, these capabilities empower…
AI Readiness: Why Cloud Infrastructure Will Decide Who Wins the Next Wave
Everywhere I go, cloud and DevOps teams are asking the same question: “Are we ready for AI?” This article has been indexed from DZone Security Zone Read the original article: AI Readiness: Why Cloud Infrastructure Will Decide Who Wins the…
Why the Principle of Least Privilege Is Critical for Non-Human Identities
Attackers only really care about two aspects of a leaked secret: does it still work, and what privileges it grants once they are in. One of the takeaways from GitGuardian’s 2025 State of Secrets Sprawl Report was that the majority…
How to Build Secure Knowledge Base Integrations for AI Agents
Done well, knowledge base integrations enable AI agents to deliver specific, context-rich answers without forcing employees to dig through endless folders. Done poorly, they introduce security gaps and permissioning mistakes that erode trust. The challenge for software developers building these…
Your SDLC Has an Evil Twin — and AI Built It
You think you know your SDLC like the back of your carpal-tunnel-riddled hand: You’ve got your gates, your reviews, your carefully orchestrated dance of code commits and deployment pipelines. But here’s a plot twist straight out of your auntie’s favorite…
Deep Dive into Distributed File System Permission Management: Linux Security Integration
In multi-user environments with high-security requirements, robust permission controls are fundamental for resource isolation. Linux’s file permission model provides a flexible access control mechanism, ensuring system security through user/group permission settings. For distributed file systems supporting Linux, compliance with this…
Development of System Configuration Management: Summary and Reflections
Series Overview This article is Part 4 of a multi-part series: “Development of system configuration management.” The complete series: This article has been indexed from DZone Security Zone Read the original article: Development of System Configuration Management: Summary and Reflections
From Data Growth to Data Responsibility: Building Secure Data Systems in AWS
Enterprise data solutions are growing across data warehouses, data lakes, data lakehouse, and hybrid platforms in cloud services. As the data grows exponentially across these services, it’s the data practitioners’ responsibility to secure the environment with secure guardrails and privacy…
Development of System Configuration Management: Performance Considerations
Series Overview This article is Part 3 of a multi-part series: “Development of system configuration management.” The complete series: This article has been indexed from DZone Security Zone Read the original article: Development of System Configuration Management: Performance Considerations
Protecting Non-Human Identities: Why Workload MFA and Dynamic Identity Matter Now
We’ve normalized multi-factor authentication (MFA) for human users. In any secure environment, we expect login workflows to require more than just a password — something you know, something you have, and sometimes something you are. This layered approach is now…
How AI and Machine Learning Are Shaping the Fight Against Ransomware
Ransomware remains one of the biggest threats to individuals and corporations, primarily because cybercriminals relentlessly look for loopholes. With traditional measures struggling to keep pace with cyber threats, the shift to artificial intelligence (AI) and machine learning (ML) can be…