Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Data Engineering: Scaling Intelligence With the Modern Data Stack. Data has evolved from a byproduct of business processes to a vital asset for innovation and…
Tag: DZone Security Zone
Blockchain, AI, and Edge Computing: Redefining Modern App Development
The overall landscape of app development is continuing with a transformative shift that is driven by various latest technologies, including AI or artificial intelligence, edge computing, and blockchain. These innovations are enhancing the efficiency and functionality of the apps, catering…
Development of System Configuration Management: Working With Secrets, IaC, and Deserializing Data in Go
Series Overview This article is Part 2.1 of a multi-part series: “Development of system configuration management.” The complete series: This article has been indexed from DZone Security Zone Read the original article: Development of System Configuration Management: Working With Secrets,…
Implementing Scalable IoT Architectures on Azure
The Internet of Things (IoT) comprises smart devices connected to a network, sending and receiving large amounts of data to and from other devices, which generates a substantial amount of data to be processed and analyzed. Edge computing, a…
Seamless Storage: Configuring Kubernetes PVC for Windows Shared Folders With SMB
Introduction In the new cloud-native era, it is important to be able to scale and manage applications efficiently. Kubernetes, as a leading container orchestration platform, provides strong features for managing storage through Persistent Volume Claims (PVCs). Mapping Kubernetes to traditional…
Building AI-Driven Anomaly Detection Model to Secure Industrial Automation
Introduction In modern industrial automation, security is a primary requirement to keep the regular operation of industrial connected devices without disruption. However, the rise of cyber risks also significantly impacts the industry’s sustainable operation. The evolving cyberattacks can affect the…
AI Data Security: Core Concepts, Risks, and Proven Practices
AI is everywhere now, and cybersecurity is no exception. If you’ve noticed your spam filter getting smarter or your bank flagging sketchy transactions faster, there’s a good chance AI is behind it. But the same tech that helps defend data…
Certificate Authorities: The Keystone of Digital Trust
TLDR: Certificate Authorities (CAs) are the ultimate trust brokers online, issuing the digital certificates that make secure web browsing, e-commerce, and confidential communications possible. This article breaks down what CAs do, the nuances of public and private trust, role of…
How to Create Ansible Users and Add Passwords
Managing users efficiently is a key part of automating system administration with Ansible. In this guide, you’ll learn how to create users, set passwords, add users to groups, and configure remote access using Ansible’s powerful tools. What is the Ansible…
Zero-Touch Patch Management With PowerShell and Intune: How We Automated Compliance at Scale
Keeping hundreds of endpoints patched and compliant sounds easy on paper until you’re juggling different departments, conflicting maintenance windows, and manual tracking spreadsheets. We knew our approach had to change when a missed update led to a critical zero-day vulnerability…
Securing Cloud Applications: Best Practices for Developers
Cloud computing offers unmatched scalability and flexibility, but it also introduces new security challenges. Developers must take proactive steps to secure applications, infrastructure, and sensitive data from cyber threats. In this tutorial, we will explore essential cloud security best practices…
Operationalizing the OWASP AI Testing Guide: Building Secure AI Foundations Through NHI Governance
Artificial intelligence (AI) is becoming a core component in modern development pipelines. Every industry faces the same critical questions regarding the testing and securing of AI systems, which must account for their complexity, dynamic nature, and newly introduced risks. The…
The Kill Switch: A Coder’s Silent Act of Revenge
In the age of code dominance, where billions of dollars are controlled by lines of code, a frustrated coder crossed the boundary between protest and cybercrime. What began as a grudge became an organized act of sabotage, one that now…
How to Architect a Compliant Cloud for Healthcare Clients (Azure Edition)
Designing cloud infrastructure for healthcare isn’t just about uptime and cost; it’s about protecting sensitive patient data and satisfying regulatory requirements like HIPAA and HITRUST. When we were tasked with migrating a healthcare client’s legacy workloads into Azure, we knew…
How to Build ML Experimentation Platforms You Can Trust?
Machine learning models don’t succeed in isolation — they rely on robust systems to validate, monitor, and explain their behavior. Top tech companies such as Netflix, Meta, and Airbnb have invested heavily in building scalable experimentation and ML platforms that…
The Next Frontier in Cybersecurity: Securing AI Agents Is Now Critical and Most Companies Aren’t Ready
You can’t secure what you don’t understand, and right now, most enterprises don’t understand the thing running half their operations. Autonomous AI agents are here. They’re booking appointments, executing trades, handling customer complaints, and doing it all without waiting for…
Software Security Treat or Threat? Leveraging SBOMs to Control Your Supply Chain Chaos [Infographic]
Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Software Supply Chain Security: Enhancing Trust and Resilience Across the Software Development Lifecycle. Software supply chain security is on the rise as systems advance and…
Secure Private Connectivity Between VMware and Object Storage: An Enterprise Architecture Guide
As an architect, security is the first thing that comes to mind when defining an architecture for a customer. One of the key things that you need to keep in mind is minimizing the network traffic routed through the public…
Development of System Configuration Management: Introduction
Series Overview This article is part 1 of a multi-part series: “Development of system configuration management.” The complete series: This article has been indexed from DZone Security Zone Read the original article: Development of System Configuration Management: Introduction
Data Mesh Security: How to Protect Decentralized Data Architectures
The rise of data mesh architectures redefines how modern organizations have approached the concept of data security. Standard best practices dictate that data should be centralized, allowing it to be collected, stored, and governed within monolithic systems, such as data…