Tag: DZone Security Zone

How You Can Avoid a CrowdStrike Fiasco

By now we’ve all heard about —  or been affected by — the CrowdStrike fiasco. If you haven’t, here’s a quick recap. An update to the CrowdStrike Falcon platform, pushed on a Friday afternoon, caused computers to crash and be…

Why You Should Use Buildpacks Over Docker

Docker is the obvious choice for building containers, but there is a catch: writing optimized and secure Dockerfiles and managing a library of them at scale can be a real challenge. In this article, I will explain why you may…

Not All MFA Is Equal: Lessons From MFA Bypass Attacks

One-time passwords are one of the most relied-on forms of multi-factor authentication (MFA). They’re also failing miserably at keeping simple attacks at bay. Any shared secret a user can unknowingly hand over is a target for cybercriminals, even short-lived TOTPs.…

Reimagining AI: Ensuring Trust, Security, and Ethical Use

The birth of AI dates back to the 1950s when Alan Turing asked, “Can machines think?” Since then, 73 years have passed, and technological advancements have led to the development of unfathomably intelligent systems that can recreate everything from images…

How To Setup OAuth JWT in the Salesforce Connector

In this post, we’ll explain all the steps required to connect a Mule application to Salesforce using the Salesforce connector with the OAuth JWT flow. You can also create your own certificate for the OAuth JWT flow with Salesforce or…

The C̶a̶k̶e̶ User Location Is a Lie!!!

I recently sat in on a discussion about programming based on user location. Folks that are way smarter than me covered technical limitations, legal concerns, and privacy rights. It was nuanced, to say the least. So, I thought I’d share…

Vulnerability Management in DevOps Environments

DevOps has become the groundwork for delivering top-notch applications quickly and efficiently in today’s agile development. Its efficiency and speed can also cause notable security threats if vulnerabilities are not managed properly. Sixty percent of data breaches succeed because organizations…

Why Do We Need to Keep Our Builds Green?

The Trivial Answer Most engineers know that we must have green builds because a red build indicates some kind of issue. Either a test did not pass, or some kind of tool found a vulnerability, or we managed to push…

Guarding Privacy: Cutting-Edge Technologies for Data Protection

Data has become a valuable commodity in today’s digital era. It innovatively drives businesses to make informed decisions and personalized experiences for their customers, optimize operational efficiency, and accurately predict market trends. However, data’s immense value comes with an equally…

Don’t Get Hacked! Essential Cybersecurity Tips You Need To Know

Technology in the digital age has revolutionized our lives. However, this convenience comes with a growing threat: cybercrime. Malicious actors, ranging from petty thieves to sophisticated cybercriminals, operate online, seeking to exploit vulnerabilities and steal sensitive information, financial data, and…

How To Implement a Gateway With Spring Cloud

A microservice system could have a high number of components with complex interactions. It is important to reduce this complexity, at least from the standpoint of the clients interacting with the system. A gateway hides the microservices from the external…

How Behavioral Biometrics Enhances Fraud Prevention

Today’s fraud prevention processes are far smoother than they used to be. Automated alert systems and authentication measures are now standard, but these relatively simple, rules-based solutions are still imperfect. The growing field of behavioral biometrics offers a more reliable…