Resilience refers to the ability to withstand, recover from, or adapt to challenges, changes, or disruptions. As organizations increasingly embrace the microservices approach, the need for a resilient testing framework becomes important for the reliability, scalability, and security of these…
Tag: DZone Security Zone
Secure Password Hashing in Java: Best Practices and Code Examples
In the domain of digital security, password hashing stands as a critical line of defense against unauthorized access. However, the landscape of hashing algorithms has evolved significantly, with some methods becoming obsolete and newer, more secure techniques emerging. This article…
Are the Fears About the EU Cyber Resilience Act Justified?
On Wednesday, July 19, the European Parliament voted in favor of a major new legal framework regarding cybersecurity: the Cyber Resilience Act (CRA). According to the press release following the vote: This article has been indexed from DZone Security Zone…
Anticipating the Journey: Launching Your First Open Source Project
I’ve been deeply immersed in the world of developer products for the past decade, and let me tell you, I’ve been quite an open-source enthusiast. Over the years, I’ve had the pleasure (and occasional pain) of shepherding open-source projects of…
Matching Algorithms in Dating Apps
Modern dating apps have long been a familiar part of our daily lives. Ten years ago, Tinder, Mamba, Pure, and others turned traditional ideas about dating and relationships upside down. Whether we like it or not, dating apps have started…
The Elusive Quest for DevSecOps Collaboration
Despite years of discussing DevSecOps, achieving security and development collaboration remains an uphill battle in most organizations. This article explores why real-world DevSecOps adoption lags behind expectations, common barriers faced, and how the Stream Security platform bridges visibility and policy…
Automate Your SSO With Ansible and Keycloak
The article Deploy Keycloak single sign-on with Ansible discussed how to automate the deployment of Keycloak. In this follow-up article, we’ll use that as a baseline and explore how to automate the configuration of the Keycloak single sign-on (SSO) server,…
With the Right Support, Developers Can Lead Your Organization to Superior PCI-DSS 4.0 Compliance
The Payment Card Industry Data Security Standard (PCI-DSS) version 4.0 will change almost everything about security for any business or organization that accepts electronic payments, which is a vast majority of them. And make no mistake, this update will be…
Using VB.NET To Check for Proxy and VPN With IP2Location.io Geolocation API
Virtual Private Network (VPN) servers are proxy servers that people use daily when browsing the Internet. They use it because it shields them from being tracked by websites. As most of us are aware, websites track their visitors for advertising…
Data Privacy and Cloud Computing: A Review of Security and Privacy Measures
In the digital era, where data has become the backbone of businesses, it becomes very important to ensure its security and privacy. The huge growth in cloud computing, wherein data is stored and processed remotely, gave rise to various measures…
Learning To Use Web3: First Impressions
Come along with me as I learn about blockchain and web3: the good, the bad, why it’s needed, how to learn it, and, in the end, if it’s really what it’s hyped up to be. Web3 is a new vision…
How To Protect RDP From Ransomware Attacks
Ransomware is a massive threat, and like all types of cybercrime, it’s always evolving. Consequently, you must learn what vulnerabilities are targeted to stay safe. Remote desktop protocol (RDP) is one of the most significant of those weaknesses today. What…
AI and Automation
This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report In recent years, developments in artificial intelligence (AI) and automation technology have drastically reshaped application security. On one hand, the progress in AI and…
Docker Image Building Best Practices
1. Start With a Minimal Base Image Starting with a basic, minimum image is essential when creating Docker images. This method minimizes security concerns while shrinking the image size. For basic base images, Alpine Linux and scratch (an empty base…
Using Data Diodes for One-Way Information Transfer and Preventing Data Leaks
Every organization dealing with information processing eventually faces the challenge of securely storing confidential data and preventing its leakage. The importance of this issue for a company depends on the potential damage a data breach could cause. The greater the…
The Perils of AI Hallucination: Unraveling the Challenges and Implications
Artificial Intelligence (AI) has undeniably transformed various aspects of our lives, from automating mundane tasks to enhancing medical diagnostics. However, as AI systems become increasingly sophisticated, a new and concerning phenomenon has emerged – AI hallucination. This refers to instances…
The Art of Securing Cloud-Native Mobile Applications
This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report In the ever-evolving landscape of mobile applications, the seamless integration of cloud-native technologies has become a cornerstone for innovation, speed, and efficiency. As organizations…
API Analytics: Unleashing the Power of Data-Driven Insights for Enhanced API Management
In the realm of modern digital integration, Application Programming Interfaces (APIs) have become the linchpin of connectivity, enabling seamless interactions between diverse applications and systems. However, managing APIs effectively is no longer just about designing and deploying them—it’s also about harnessing…
Unleashing the Power of AI in Fintech API Management: A Comprehensive Guide for Product Managers
Welcome to the next article in our series on mastering API integration, specifically tailored for the fintech industry. In this article, we will explore the transformative role of Artificial Intelligence (AI) in API management within the fintech sector. As product managers,…
Beyond Captchas: Exploring the Advancements of AI in Modern Bot Mitigation
The battle between human users and sneaky bots is a constant struggle in the ever-evolving cybersecurity landscape. And the conventional defense mechanisms, including CAPTCHAs, have been a reliable shield for a long. However, with the sophistication of cyberattacks and bots…