This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report If you’ve ever explored regulatory compliance and cybersecurity, you’ll understand the importance of continuous compliance in the digital age, where evolving technology and regulations…
Tag: DZone Security Zone
Demystifying SAST, DAST, IAST, and RASP
This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report Effective application security relies on well-defined processes and a diverse array of specialized tools to provide protection against unauthorized access and attacks. Security testing…
Shared Platforms Explained: Navigating the Enterprise Ecosystem
In the world of enterprise technology, shared platforms like Kafka, RabbitMQ, Apache Flink clusters, data warehouses, and monitoring platforms are essential components that support the robust infrastructure leading to modern microservices architectures. We see shared platforms acting as mediators between…
Tired of Messy Code? Master the Art of Writing Clean Codebases
You’ve conquered the initial hurdle, learning to code and landing your dream job. But the journey doesn’t end there. Now comes the real challenge: writing good code. This isn’t just about functionality; it’s about crafting elegant, maintainable code that stands…
Data Governance: MDM and RDM (Part 3)
What Is Data Governance? Data governance is a framework that is developed through the collaboration of individuals with various roles and responsibilities. The purpose of this framework is to establish processes, policies, standards, and metrics that help organizations achieve their goals.…
Modern DevSecOps
This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report DevSecOps — a fusion of development, security, and operations — emerged as a response to the challenges of traditional software development methodologies, particularly the…
How To Implement Data Management Into Your AI Strategy
The first impression most of us have about AI is likely from the sci-fi movies where robots overpower humans. Remember the films like “Terminator” or novels like “Robopocalypse”? Given the pace of development in the space of AI, we are…
A Practitioner’s Guide to Security-First Design
This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report Today, safeguarding assets is not just a priority; it’s the cornerstone of survival. The lurking threats of security breaches and data leaks loom larger…
Operational Technology Cybersecurity for Automotive Industry: Learnings From an IBM OT Security Architect
Operational technology (OT) refers to industrial systems and controls that perform physical work, such as Programmable Logic Controllers (PLCs) and Supervisory Control and Device Acquisition (SCADA) systems. OT systems are ubiquitous across all critical infrastructure industries, such as Oil and…
Does Your App Accept Digital Wallets?
Digital wallets are electronic systems that securely store payment information digitally. They make it easy to make electronic transactions online or in stores without using physical cards. Digital wallets are designed for convenience and often include security features to protect…
How To Build a Financial App With Proactive Security Measures
Of course, the advent of the internet has facilitated the sharing of important information all across the world. But the catch is that with such sharing options at everyone’s disposal, there comes a risk of leakage of confidential data. And…
Unleashing the Power of GPT in Slack With React Integration
In the dynamic landscape of communication and collaboration, Slack has emerged as a powerful platform for teams to connect and work seamlessly. The integration of GPT (Generative Pre-trained Transformer) with Slack, powered by React, takes this collaboration to new heights.…
TechBash: Automation, Security and Development Best Practices in The Poconos
The Poconos mountain region is most famous for its skiing and snowboarding. Located west of the hustle and bustle of New York City and north of Philadelphia, the Poconos are a quick drive from the hectic city life to some…
Edge Computing: Revolutionizing Data Processing and Connectivity
Data has risen to become the most valuable resource in the digital age. A massive amount of data needs to be gathered, processed, and analyzed in real-time as a result of the Internet of Things (IoT), artificial intelligence, and cloud…
Holistic Approach To Privacy and Security in Tech: Key Principles
When I’m asked about privacy and security issues that the IT industry faces today, the most generic idea that comes up is “do everything with privacy in mind.” This can be applied to any stage and part of the development…
The Virtual Desktop Revolution: Redefining Work and Productivity
Virtual desktops, a recent technological advancement that has revolutionized the way people use and interact with their computers, have advanced technology. A virtual desktop, also referred to as a virtual desktop infrastructure (VDI), is a virtualized computing environment that enables…
Deploy Keycloak Single Sign-On With Ansible
In this article, you’ll use Ansible to simplify and automate the installation of Keycloak, a popular open-source tool to implement single sign-on for Web applications. The tutorial in this article builds on an Ansible Collection named middleware_automation.keycloak, which has been…
The Playbook for Building Generative AI Applications
Generative AI (GenAI) tools powered by Large Language Models (LLM) are transitioning from a captivating vision to a tangible reality as businesses realize their potential for reshaping industries and fostering creativity. Its capabilities, from crafting engaging content to generating realistic…
Navigating the Cybersecurity Landscape
Understanding the Pervasive Landscape of Cybersecurity Threats Cyber threats are diverse and continually evolving, ranging from commonplace scams to highly sophisticated attacks. Let’s delve deeper into the nature of prevalent threats, gaining a nuanced understanding that will serve as the…
Security Measures To Be Taken While Developing a Mobile Application
Mobile application security isn’t a component or an advantage – it is a minimum essential. One break could cost your organization not only a large number of dollars but rather a lifetime of trust. That is the reason security ought…