< article> The recent release of the Accelerate State of DevOps Report has once again highlighted the value of organizational culture. If you create a generative culture with high trust and low blame, you’ll receive a 30% boost to your…
Tag: DZone Security Zone
18 Software Development Trends and Predictions 2024
The need for thorough risk assessments, continuous testing, and compliance checks before full-scale deployments is unavoidable. The future of software development demands businesses to be gearing up for a delicate dance between innovation and reliability. This year, we saw enthusiasm…
Secrets Management Takes More Than Just Tools
Every company wants to have a good security posture, and most are investing in security tooling. According to Gartner, worldwide spending on security is forecast to grow 11.3% in 2023 to reach more than $188.3 billion. However, despite all this…
Introducing Jira Security: Best Practices for Protecting Your Data
There is no doubt that Jira is one of the most popular project management and issue-tracking tools for organizations. It provides a great number of benefits to teams, including improved collaboration between technical and non-technical teams, increased visibility, enhanced productivity,…
Authentication at the Network Edge
In order to protect themselves in a growing attack landscape, companies must employ defensive security techniques and evaluate if they’re doing enough to prevent bad actors from accessing their networks. In this post, we’ll discuss types of authentication that allow…
Bridging the Gap: Better Token Standards for Cross-chain Assets
Taking ERC20 tokens cross-chain is broken. Today, bridges are often slow and expensive, have security vulnerabilities (as evidenced most recently by the Multichain hack), and fragment liquidity when each bridge creates its own version of the bridged token liquidity (and…
Securing Kubernetes: Don’t Underestimate the Risk Posed by Misconfigurations
Deployed by more than 60% of organizations worldwide, Kubernetes (K8s) is the most widely adopted container-orchestration system in cloud computing. K8s clusters have emerged as the preferred solution for practitioners looking to orchestrate containerized applications effectively, so these clusters often…
Why Granular, Scalable Control Is a Must for Every CTO
Robust and agile security frameworks are crucial for any organization. With the shift towards a microservices architecture, a more refined, granular level of access control becomes imperative due to the increased complexity, distribution, and autonomy associated with individual service operations.…
Should You Always Use a Service Mesh?
The service mesh has become popular lately, and many organizations seem to jump on the bandwagon. Promising enhanced observability, seamless microservice management, and impeccable communication, service mesh has become the talk of the town. But before you join the frenzy,…
A Comprehensive Look at Hardware Components in a Cloud Computing Data Center
In order to provide computational resources and services over the internet, a cloud computing data center is a complex infrastructure that combines different hardware components. In this thorough overview, we will look at the various hardware parts that are frequently…
From Ransomware to Ransom Nations: Everything You Need to Know About State-Sponsored Cyberattacks
In a world where the click of a mouse can be as powerful as a nuclear button, the evolution of cyber threats has taken a sinister turn. What was once a digital nuisance in the form of ransomware has now…
A Look at the Future of Supply Chain and National Security: Updates From CISA and NIST
The world of cyber threats is continually evolving, and the range of targets is constantly expanding. Fortunately, cybersecurity is rapidly progressing as well. In August 2023, two different U.S. government organizations published new reports about what to expect moving ahead,…
How To Adopt Shift Left Security on the Cloud
In an era where cloud computing reigns supreme, the concept of security has undergone a profound transformation. As businesses rapidly migrate their operations and data to the cloud, the need to secure this digital frontier becomes increasingly paramount. Enter “Shift…
Platform Engineering Trends in Cloud-Native: Q&A With Ville Aikas
The rise of Kubernetes, cloud-native, and microservices spawned major changes in architectures and abstractions that developers use to create modern applications. In this multi-part series, I talk with some of the leading experts across various layers of the stack —…
Unlocking a Passwordless Future: The Case for Passkeys
Passwords have long outlived their usefulness, yet they stubbornly persist as the default for authentication. 61% of consumers believe passwords are inherently insecure, while 47% find them inconvenient and frustrating. With password reuse rampant and phishing on the rise, individuals…
Unlocking the Potential of Low-Code No-Code Development Platforms
Gartner forecasts that the low-code/no-code platforms market to grow in 2024 and revolutionize the world of enterprise architecture. This burgeoning technology is set to skyrocket in adoption, propelling businesses into a new era of efficiency and agility. It is a…
Understanding Zero Trust Security Building a Safer Digital World
In our rapidly evolving digital age where technology underpins almost every facet of our lives, cybersecurity has never been more critical. As the world becomes increasingly interconnected with personal devices and social networks to critical infrastructure and global business operations,…
Enhancing IoT Security: The Role of Security Information and Event Management (SIEM) Systems
The rapid growth of the Internet of Things (IoT) has revolutionized the way we connect and interact with devices and systems. However, this surge in connectivity has also introduced new security challenges and vulnerabilities. IoT environments are increasingly becoming targets…
Investigate Google Service Account Key Origins and Usage
Service accounts can pose a security risk for your Google Cloud project if not managed properly. Because they are often highly privileged, anyone who is able to authenticate as a service account can likely take sensitive actions in your environment.…
Beyond the Login Box: Okta Fuels Developer Innovation in Identity
The traditional username and password combo remains the go-to for most web and mobile authentication. But as Bhawna Singh, CTO of Okta Customer Identity Cloud, shared during the Developer Keynote at Oktane 23, “It’s time we move past it.” She…