Tag: DZone Security Zone

Security Challenges in AI-Powered Applications

AI is revolutionizing how Software-as-a-Service (SaaS) applications work, making them more efficient and automated than ever before. However, this rapid progress has opened up a Pandora’s box of new security threats. From the sly manipulation of data to the gradual…

Empowering Developers in Code Security

Effective security requires a shared responsibility model. Developers are already overburdened with their primary tasks of writing code and delivering features, and we think it is not realistic to expect them to know everything about security, be responsible for triaging…

Developing Security-By-Design Across the Zoho Application Suite

Delivering secure application services free from exposed vulnerabilities — without imposing overbearing authentication controls that frustrate users, or draconian code review requirements that inhibit developer innovation — is a challenge as old as the internet itself.  Organizations naturally prioritize building…

SBOMs in Action: Securing Your Golden AMIs From Build to Runtime

Golden Amazon Machine Images (AMIs) are the foundation for launching consistent and efficient instances in your AWS cloud environment. Ensuring their security and immutability is paramount. This guide delves into how Software Bill of Materials (SBOMs), cryptographic signing, and runtime…

Penetration Testing for Beginners: A Step-By-Step Guide

In an era where digital transformation is rapidly advancing, the importance of cybersecurity cannot be overstated. One of the essential aspects of maintaining robust security is penetration testing, commonly known as pentesting. This guide aims to provide beginners with a…

Create JWT Using DataWeave JWT Library

Recently in one of my projects, there was a requirement to create JWT within the MuleSoft application and send that as an OAuth token to the backend for authentication. After doing some research, I got to know several ways to…

regreSSHion: Should We Panic About the New OpenSSH Vulnerability?

What Is the regreSSHion Vulnerability (CVE-2024-6387)? regreSSHion is a newly discovered vulnerability in OpenSSH that affects glibc-based Linux systems. regreSSHion (CVE-2024-6387) may allow arbitrary code execution with root privileges on systems with default configurations. Why Is Everyone Worried About the…

How DevSecOps Can Combat Zero-Day Threats

Zero-day threats are becoming more dangerous than ever. Recently, bad actors have taken over the TikTok accounts of celebrities and brands through a zero-day hack. In late May to early June, reports of high-profile TikTok users losing control over their…

Enhancing Security With ZTNA in Hybrid and Multi-Cloud Deployments

Today’s network infrastructure is rapidly changing with the adoption of hybrid and multi-cloud architectures to leverage the benefits of flexibility, scalability, and redundancy. These advantages come with their own set of challenges, particularly in securing access to resources and users spread…

Exploring Cross-Chain Compatibility in dApp Development

The use of Blockchain technology is growing rapidly. The creation of decentralized applications is rising. The issues that need solving include cross-chain interoperability. It lets dApps easily connect and work with different blockchains. Improvement of the dApps is also needed.…