Tag: DZone Security Zone

Best Practices To Secure Stateless REST Applications

Statelessness in RESTful applications poses challenges and opportunities, influencing how we manage fundamental security aspects such as authentication and authorization. This blog aims to delve into this topic, explore its impact, and offer insights into the best practices for handling…

Security Best Practices for Docker Images

Docker images play a pivotal role in containerized application deployment. They encapsulate your application and its dependencies, ensuring consistent and efficient deployment across various environments. However, security is a paramount concern when working with Docker images. In this guide, we…

The Art of Ethical Hacking: Securing Systems in the Digital Age

In today’s world, where everything is connected to the internet, cybersecurity is more significant than ever. Cyberattacks can cause serious damage to individuals, businesses, and governments by stealing data, disrupting services, or compromising systems. To prevent these attacks, we must…

Exploring the Nexus Between DevSecOps and Cybersecurity

DevSecOps, short for Development, Security, and Operations, is an approach to software development that integrates security practices into the DevOps (Development and Operations) process. The main goal of DevSecOps is to ensure that security is an integral part of the…

Hiding Data in DB2

In this article, we’ll talk about fine-grained access control in DB2 – hiding data that is, in fact, present in the database, but should not be accessible to certain users. Fine-grained access control is usually done in the database itself…

Common Cybersecurity Threats and How To Protect Yourself

Cybersecurity threats are acts performed by people with hurtful expectations, whose objective is to take information, do harm or disrupt computing systems. Normal classes of cyber threats include malware, social engineering, man-in-the-middle (MitM) attacks, denial of service (DoS), and injection…

Safe Clones With Ansible

I started research for an article on how to add a honeytrap to a GitHub repo. The idea behind a honeypot weakness is that a hacker will follow through on it and make his/her presence known in the process.  My…

Cybersecurity: A Trojan Horse in Our Digital Walls?

The rapid advancement of artificial intelligence (AI) in cybersecurity has been widely celebrated as a technological triumph. However, it’s time to confront a less discussed but critical aspect: Is AI becoming more of a liability than an asset in our…

NIST AI Risk Management Framework: Developer’s Handbook

The NIST AI RMF (National Institute of Standards and Technology Artificial Intelligence Risk Management Framework) provides a structured framework for identifying, assessing, and mitigating risks associated with artificial intelligence technologies, addressing complex challenges such as algorithmic bias, data privacy, and…

The Noticeable Shift in SIEM Data Sources

SIEM solutions didn’t work perfectly well when they were first introduced in the early 2000s, partly because of their architecture and functionality at the time but also due to the faults in the data and data sources that were fed…