How Secure Cloud Development Addresses the Challenge of Working Securely With Remote Teams The landscape of software development is constantly changing, and secure Cloud Development Environments (CDEs) have brought about a remarkable transformation in secure project management and execution when…
Tag: DZone Security Zone
Security Considerations in Kubernetes
Kubernetes is a robust container orchestration technology that is extensively used for containerized application deployment, scaling, and management. While Kubernetes provides a number of capabilities for protecting containerized workloads, it is critical to understand and handle numerous security aspects in…
Securing Your AWS RDS Instances: Best Practices and Examples
Amazon Web Services (AWS) Relational Database Service (RDS) simplifies the setup, operation, and scaling of a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching, and…
Managing IoT Edge Devices at Scale: Device Lifecycle and Configuration Management
IoT has ushered in an era of unprecedented connectivity and data collection. IoT edge devices, ranging from sensors to industrial machines, have become integral to various industries, offering insights, automation, and efficiency. However, managing a large number of these edge…
Build a Digital Collectibles Portal Using Flow and Cadence (Part 1)
In this tutorial, we’ll learn how to build a website for collecting digital collectibles (or NFTs) on the blockchain Flow. We’ll use the smart contract language Cadence along with React to make it all happen. We’ll also learn about Flow,…
VPN Log vs. Zero-Log Policy: A Comprehensive Analysis
Data, often referred to as the lifeblood of modern businesses, enables organizations to embrace innovations that further enhance productivity. However, harnessing this power comes with great risks. Increasing reliance on data being collected comes with the challenges of safeguarding this…
The Impact of Open-Source Software on Public Finance Management
Many government bodies have historically been averse to open-source software (OSS). Now that OSS has gained popularity and shown what it can do in the private sector, that’s changing. The open-source movement holds significant potential for public agencies, too, especially…
Combating Malware Threats
In the digital age, the security landscape is continually evolving, with malicious actors developing and deploying a variety of sophisticated malware to exploit systems, steal data, and disrupt operations. Understanding the diverse array of malware types is crucial for individuals,…
Evolution of Privacy-Preserving AI: From Protocols to Practical Implementations
Year by year, artificial intelligence evolves and becomes more efficient for solving everyday human tasks. But at the same time, it increases the possibility of personal information misuse, reaching unprecedented levels of power and speed in analyzing and spreading individuals’…
Securing the Keys to the Kingdom: Exploring the Depths of Privileged Access Management (PAM)
In the paradigm of zero trust architecture, Privileged Access Management (PAM) is emerging as a key component in a cybersecurity strategy, designed to control and monitor privileged access within an organization. This article delves into the pivotal role of PAM…
Hardening Apache APISIX With the OWASP’s Coraza and Core Ruleset
The Open Worldwide Application Security Project is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of IoT, system software and web application security. The OWASP provides free and open resources. It is…
Good Application Security Posture Requires Good Data
The term ‘security posture” is used to describe the state of an organization’s overall security and response readiness. Multiple solutions are emerging that aggregate findings to provide a holistic view of enterprise security risks. Security posture can also be seen…
Best Practices To Create Highly Secure Applications in Mule 4
In this blog, I would like to share a few best practices for creating highly secure applications in Mule 4 (security at various levels/layers — application, data, etc.) for all deployment options. Most of the configuration details (relevant to security)…
Unleashing the Power of WebAssembly to Herald a New Era in Web Development
The continuous upgrades in the landscape of web development are empowering software developers every day with all the leverage they need to enhance performance, improve efficiency, and create richer user experiences across various domains. Enter WebAssembly (Wasm), a game-changing technology…
A Comprehensive Guide To Achieving SOC 2 Compliance
Data security and privacy are one of the top priorities for organizations and their clients in the current digital era. Industry standards and regulatory frameworks have been developed to make sure that businesses manage sensitive data appropriately. The SOC (System…
Developing Software Applications Under the Guidance of Data-Driven Decision-Making Principles
This article underscores the vital role of data in the creation of applications that deliver precise outputs aligned with business requirements. To architect and cultivate an application that yields precise outputs in alignment with business requirements, paramount emphasis must be…
Composability in Flow: Unlocking Technical and Business Opportunities
Composability in blockchains refers to a framework that permits the interaction and interconnection of discrete elements, especially smart contracts. This kind of modular ecosystem is important as it helps programmers utilize existing components to build advanced systems very quickly. In…
Choosing the Right SMB Backup Solution
In today’s digital age, data is the lifeblood of small and medium-sized businesses (SMBs). Whether it’s customer records, financial data, or intellectual property, the loss of critical information can be disastrous. To safeguard against such potential disasters, SMBs must invest…
Patch Management and Container Security
What Is Patch Management? Patch management is a proactive approach to mitigate already-identified security gaps in software. Most of the time, these patches are provided by third-party vendors to proactively close the security gaps and secure the platform, for example.…
Unlocking Seamless Experiences: Embracing Passwordless Login for Effortless Customer Registration and Authentication
User experience stands at the forefront of technological advancements in the rapidly evolving modern business landscape. Admit it; if your platform isn’t offering a seamless experience to your targeted audience and you fail to create an impression when a user…