What Is an API Gateway? An API Gateway is a tool that acts as an intermediary for requests from clients seeking resources from servers or microservices. It manages, routes, aggregates, and secures the API requests. Like previous patterns we have…
Tag: DZone Security Zone
How 5G Is Empowering Digital Twins
5G is revolutionizing digital twin technology, enabling faster data transfers, real-time monitoring, seamless collaboration, and advanced security. These features are advancing the capabilities of digital twins and the value organizations can gain from them. What are the benefits of building…
Instant Microservices: Rules for Logic and Security
In this article, see how to build a complete database system, in minutes instead of weeks or months: An API, and, we’ll add UI and logic to make it a microservice Logic and security: Multi-table constraints and derivations, and role-based security…
Essential Security Measures for PDF Documents
Portable Document Format (PDF) is a file format that contains a comprehensive representation of a document, encompassing elements like text, fonts, graphics, and other components. PDF is often considered a secure document format due to its inherent security features. These…
A Tale of Two Intersecting Quality Attributes: Security and Performance
“I want to build a system that is highly secure, scalable, reliable, performant, compliant, robust, resilient, and durable.” Add more adjectives to that to really dream of a quintessential solution. Is that even possible? Where do we make the two…
Xcode Plugins and Extensions: Enhancing Your Development Experience
As a tech leader with years of experience in the custom software development industry, I’ve witnessed the rapid evolution of tools and technologies that have revolutionized how we create software. Among these, Xcode, Apple’s integrated development environment (IDE), has been…
Future-Proofing Retail: Rethinking Cybersecurity for the Digital Shopping Era
The holiday shopping season is upon us again, and retailers are gearing up for the highly anticipated sales events of Black Friday and Cyber Monday. While these days represent peak consumer spending, the prominence of digital channels also introduces complex…
Understanding PDF Standards: What Developers Should Know
Portable Document Format (PDF) is a universal document-sharing and collaboration medium. From e-books to legal documents, PDFs are widely used in various business, educational, and governmental sectors. The acronym “PDF” encompasses several distinct standards, each designed for specific requirements and…
Spring OAuth Server: Authenticate User With UserDetails Service
In this article, we will see how we can customize the authentication where user details are fetched from another component/service over HTTP. Store user details as Principal and use them later while creating tokens to customize the claims in JWT…
Data Governance Best Practices
In the digital age, data governance isn’t a luxury; it’s a necessity. From multinationals to fledgling startups, organizations are becoming increasingly data-centric. The myriad technologies at our disposal — SQL databases, NoSQL systems, REST APIs, GraphQL, and more — offer…
Better Smart Contract Security With Fine-Grained Permissions in Cadence
Flow is a permissionless layer-1 blockchain built to support the high-scale use cases of games, virtual worlds, and the digital assets that power them. The blockchain was created by the team behind Cryptokitties, Dapper Labs, and NBA Top Shot. One…
How To Fix SignTool Error
Are you running into this error message but can’t seem to get past it to digitally sign your code using a code-signing certificate? We’ll walk you through the troubleshooting solutions that’ll fix the Signtool ‘no certificates were found’ error in…
Data Integration in Multi-Cloud Environments: Strategies and Approaches
In today’s hyper-connected world, data is often likened to the new oil—a resource that powers modern businesses. As organizations expand their operational landscapes to leverage the unique capabilities offered by various cloud service providers, the concept of a multi-cloud strategy…
Bridging Agile and Continuous Data Management: A Synergetic Perspective
In the realm of software development, Agile methodologies have taken center stage for their ability to enable rapid and iterative progress. But what about continuous data management (CDM)? While often considered separate disciplines, closer examination reveals a symbiotic relationship that…
Harnessing GenAI: Building Cyber Resilience Against Offensive AI
Generative AI (GenAI) is revolutionizing the cybersecurity landscape, creating both new opportunities and fresh challenges. GenAI empowers users to create cyberattacks without traditional coding skills and automate malicious content creation, as evidenced by the LL Morpher virus crafted using ChatGPT. GenAI…
Developers’ Guide to Data Loss Prevention: Best Practices and Strategies
What Does Data Loss Prevention Do? Throughout 2023, a private research university discovered multiple breaches of its data. In August 2023, an American educational technology company found that millions of its users’ email addresses had been scrapped. In early October…
Infection Method: Domain Takeover
A domain takeover is a cyberattack when an attacker gains control of a domain name owned by another person or organization. This can have severe consequences as the attacker can use the domain for malicious purposes, such as spreading malware,…
Data Excellence Unveiled: Mastering Data Release Management With Best Practices
In today’s data-driven world, business enterprises extensively count on data warehouses to store, process, and analyze vast volumes of data. Thanks to data warehouses, the foundation of business intelligence and analytics, enterprises can make informed decisions and gain an edge…
Spring OAuth Server: Default Configuration
Spring has come out with an OAuth2 solution, and in this article, we will look at the default configuration that comes bundled with the spring-oauth server. Details about how OAuth2.0 works are out of the scope of this article and…
Advancing IoT Security: IoT Security Analytics Tools
The advent of the Internet of Things (IoT) has ushered in a new era of connectivity, revolutionizing various sectors, including homes, industries, and urban areas. However, this widespread connectivity also brings about significant security challenges, necessitating robust threat detection and…