Tag: DZone Security Zone

Spring OAuth Server: Token Claim Customization

I wrote previously about the default configuration of Spring oauth-authorization-server. Now let’s jump into how we can customize it to suit our requirements. Starting with this article, we will discuss how we can customize the JWT token claims with default…

Resilience Pattern: Circuit Breaker

In this article, we will explore one of the most common and useful resilience patterns in distributed systems: the circuit breaker. The circuit breaker is a design pattern that prevents cascading failures and improves the overall availability and performance of…

Introduction To Face Authentication With FACEIO in AngularJS

In today’s digital age, security, and user convenience are of paramount importance for web applications. Traditional methods of authentication, such as passwords, while widely used, come with their own set of challenges, including the risk of breaches and the inconvenience…

Architecture Patterns: API Gateway

What Is an API Gateway? An API Gateway is a tool that acts as an intermediary for requests from clients seeking resources from servers or microservices. It manages, routes, aggregates, and secures the API requests. Like previous patterns we have…

How 5G Is Empowering Digital Twins

5G is revolutionizing digital twin technology, enabling faster data transfers, real-time monitoring, seamless collaboration, and advanced security. These features are advancing the capabilities of digital twins and the value organizations can gain from them. What are the benefits of building…

Instant Microservices: Rules for Logic and Security

In this article, see how to build a complete database system, in minutes instead of weeks or months: An API, and, we’ll add UI and logic to make it a microservice Logic and security: Multi-table constraints and derivations, and role-based security…

Essential Security Measures for PDF Documents

Portable Document Format (PDF) is a file format that contains a comprehensive representation of a document, encompassing elements like text, fonts, graphics, and other components. PDF is often considered a secure document format due to its inherent security features. These…

Understanding PDF Standards: What Developers Should Know

Portable Document Format (PDF) is a universal document-sharing and collaboration medium. From e-books to legal documents, PDFs are widely used in various business, educational, and governmental sectors. The acronym “PDF” encompasses several distinct standards, each designed for specific requirements and…

Data Governance Best Practices

In the digital age, data governance isn’t a luxury; it’s a necessity. From multinationals to fledgling startups, organizations are becoming increasingly data-centric. The myriad technologies at our disposal — SQL databases, NoSQL systems, REST APIs, GraphQL, and more — offer…

How To Fix SignTool Error

Are you running into this error message but can’t seem to get past it to digitally sign your code using a code-signing certificate? We’ll walk you through the troubleshooting solutions that’ll fix the Signtool ‘no certificates were found’ error in…

Harnessing GenAI: Building Cyber Resilience Against Offensive AI

Generative AI (GenAI) is revolutionizing the cybersecurity landscape, creating both new opportunities and fresh challenges. GenAI empowers users to create cyberattacks without traditional coding skills and automate malicious content creation, as evidenced by the LL Morpher virus crafted using ChatGPT. GenAI…