Tag: DZone Security Zone

Going Beyond MFA: How Okta is Redefining Enterprise Identity

At Oktane23, Okta revealed new solutions to automate identity governance, implement privileged access management, and enable continuous authentication and threat protection. Introduction Identity has historically been regarded as the gateway to grant or deny access to an enterprise’s digital resources…

The Rise of Superclouds: The Latest Trend in Cloud Computing

Since the pandemic hit the world two years ago, cloud adoption has exploded. The majority of customers use multi-clouds, which are isolated silos, and each public cloud has its own management tools, operating environment, and development environment. Companies keep investing…

Service Mesh and Management Practices in Microservices

In the dynamic world of microservices architecture, efficient service communication is the linchpin that keeps the system running smoothly. To maintain the reliability, security, and performance of your microservices, you need a well-structured service mesh. This dedicated infrastructure layer is designed…

Dual Pillars of Embedded Systems: Ensuring Safety and Security

In today’s interconnected digital age, embedded systems are ubiquitous, from household appliances to sophisticated industrial machines and medical devices. As these systems increasingly impact our daily lives and critical infrastructures, ensuring their safety and security has become paramount. In this…

Giving Power Back to Your Users With Flow’s Account Model

Many alternative blockchains that have emerged recently are classified as “EVM” chains, meaning they operate exactly like Ethereum but have a different execution layer. This helps the cross-compatibility of smart contracts across chains, but it doesn’t solve some of the…

Unlocking the Secrets of DevSecOps: The Essential Lifecycle Stages

Organizations today are constantly seeking ways to deliver high-quality applications faster without compromising security. The integration of security practices into the development process has given rise to the concept of DevSecOps—a methodology that prioritizes security from the very beginning rather…

Modbus Protocol: The Grandfather of IoT Communication

The Modbus protocol is a communication protocol that allows devices to communicate over various types of media, such as serial lines and ethernet. It was developed in 1979 by Modicon, a company that produced Programmable Logic Controllers (PLCs), to enable…

Navigating the Skies

This is an article from DZone’s 2023 Database Systems Trend Report. For more: Read the Report In today’s rapidly evolving digital landscape, businesses across the globe are embracing cloud computing to streamline operations, reduce costs, and drive innovation. At the…

Gossips on Cryptography: Part 1 and 2

In this blog series, We will learn about encryption and decryption basics in a very casual fashion. We will start discussing from origin of cryptography and then learn about modern techniques. One of the important and main techs in encryption…

What Is Good Database Design?

This is an article from DZone’s 2023 Database Systems Trend Report. For more: Read the Report Good database design is essential to ensure data accuracy, consistency, and integrity and that databases are efficient, reliable, and easy to use. The design…