Tag: DZone Security Zone

Zero Trust in API Management

In our digital age, the role of APIs (Application Programming Interfaces) in business is more crucial than ever. These APIs allow companies to be innovative, grow quickly, and adapt their services. But, as much as APIs are vital, they also…

Hacking Protected Java-Based Programs

This article provides examples of hacking techniques that can help Java developers avoid vulnerabilities in their programs. It is not intended to train hackers but rather for naive developers who think that standard obfuscators will save them from their intellectual property…

Exploring the Security Risks of Large Language Models

According to a recent survey, 74% of IT decision-makers have expressed concerns about the cybersecurity risks associated with LLMs, such as the potential for spreading misinformation. The world of Artificial Intelligence (AI) is booming with new capabilities, mainly owing to…

How To Use Artificial Intelligence to Optimize DevOps

DevOps and AI make an inseparable pair and impact businesses of all kinds. While DevOps enables speedy product development and easier maintenance of existing deployments, AI transforms the overall system functionality. The DevOps team can rely on artificial intelligence and…

Unveiling the Power of Helidon 4: A Dive Into New Features

In the ever-evolving landscape of microservices development, Helidon has emerged as a beacon of innovation. The release of Helidon 4 brings forth a wave of enhancements and features that promise to redefine the way developers approach microservices architecture. In this…

Microservices Resilient Testing Framework

Resilience refers to the ability to withstand, recover from, or adapt to challenges, changes, or disruptions. As organizations increasingly embrace the microservices approach, the need for a resilient testing framework becomes important for the reliability, scalability, and security of these…

Matching Algorithms in Dating Apps

Modern dating apps have long been a familiar part of our daily lives. Ten years ago, Tinder, Mamba, Pure, and others turned traditional ideas about dating and relationships upside down. Whether we like it or not, dating apps have started…

The Elusive Quest for DevSecOps Collaboration

Despite years of discussing DevSecOps, achieving security and development collaboration remains an uphill battle in most organizations. This article explores why real-world DevSecOps adoption lags behind expectations, common barriers faced, and how the Stream Security platform bridges visibility and policy…

Automate Your SSO With Ansible and Keycloak

The article Deploy Keycloak single sign-on with Ansible discussed how to automate the deployment of Keycloak. In this follow-up article, we’ll use that as a baseline and explore how to automate the configuration of the Keycloak single sign-on (SSO) server,…