Tag: DZone Security Zone

Rethinking Data Governance: Metrics for Meaningful Outcomes

For years, data governance has been obsessed with a metric that feels more like accounting than strategic decision-making: coverage. Data Governance tool vendors educated a generation of governance professionals to diligently track the percentage of documented data, chasing a completion…

Device and Data Security in Embedded Systems

Embedded systems are at the core of our modern-age technology, powering everything from smart electronic devices to connected applications. These systems have become crucial in various industries enabling advanced applications. However, the security of these devices has become a major…

Edge Security for IoT: Protecting Data at the Edge

The Internet of Things (IoT) has rapidly expanded the landscape of connected devices, revolutionizing industries ranging from healthcare to manufacturing. However, as the number of IoT devices continues to grow, so do the security challenges. One crucial aspect of IoT…

Data Governance and DevOps

In the age of information, “data is treasure.” With trillions of datasets encapsulating the world, data is fragile. Safeguarding data is imperative, and data governance ensures data is managed, safe, and in compliance. Data Governance Data governance overlooks data. It…

TPM Chips and the Use of TPM in Virtualization Technology

The Trusted Platform Module (TPM) is an important component in modern computing since it provides hardware-based security and enables a variety of security features. TPM chips have grown in relevance in both physical and virtual contexts, where they play a…

Securing the Digital Frontier

In an era where digitalization permeates every facet of our lives, the interplay between technology, society, and regulations becomes increasingly critical. As we navigate through a world brimming with data, understanding the evolving landscape of data protection is not just…

How To Implement Supply Chain Security in Your Organization

In the ever-evolving landscape of digital innovation, the integrity of software supply chains has become a pivotal cornerstone for organizational security. As businesses increasingly rely on a complex web of developers, third-party vendors, and cloud-based services to build and maintain…

Monitoring Dynamic Linker Hijacking With eBPF

Extended Berkeley Packet Filter (eBPF) is a programming technology designed for the Linux operating system (OS) kernel space, enabling developers to create efficient, secure, and non-intrusive programs. Unlike its predecessor, the Berkeley Packet Filter (BPF), eBPF allows the execution of…

Maven Dependency Scope Applied

To get started, we are going to take an example of a typical three-layer app to analyze the module boundaries and the challenges faced in managing them. This specific architecture has been intentionally chosen, assuming that it is familiar to…

Building Decentralized Applications With Node.js and Web 3.0

This new era is characterized by the rise of decentralized applications (DApps), which operate on blockchain technology, offering enhanced security, transparency, and user sovereignty. As a full-stack developer, understanding how to build DApps using popular tools like Node.js is not…

Private Cloud’s Deployment

Public clouds are designed for everyone but there are a lot of customers that need a private version of the cloud. Sometimes, they need physically isolated data centers and networks located in their own country. These private clouds offer Platform-as-a-Service…