Managing public key infrastructure (PKI) is challenging, especially in dynamic, cloud-native environments. In the “good old days,” you could create a virtual machine, place a certificate on it, and forget about it for a couple of years (or at least…
Tag: DZone Security Zone
AI Infrastructure: Compute, Storage, Observability, Security, and More
In this third article of the AI infrastructure series, you will learn about AI infrastructure compute, storage, observability, performance, optimization (deep dive), and security. This is the final part in my three-part AI infrastructure series. It’s recommended to read the…
AI-Driven Developer Tools: Transforming the Future of Software Development
Artificial intelligence is no longer such a far-fetched example of technology in software development; it is already a strong catalyst for change in software development. Machine learning requires less time, offers more intelligent decision-making, and streamlines repetitive tasks by using…
Write Once, Enforce Everywhere: Reusing Rego Policies Across Build and Runtime
In most organizations, security and compliance are enforced twice — once during build-time checks and again at runtime through admission controllers and monitoring systems. Often, the policies written at build-time are not reused at runtime, leading to drift, redundancy, and…
Securing HTTPS From the Inside Out: Preventing Client-Side Interception Attacks
Overview HTTPS is the most common mechanism used to protect client-server communication on the internet. Most teams focus on SSL/TLS and server-side hardening — and for good reason — but security is layered: the system is only as strong as…
Building a Supply Chain Digital Twin Technology
About Supply Chain Supply chain means that the entire system is involved, from the producer to the customer. This process involves producing and delivering a product or service to the customer. It includes all the methods, systems, organizations, people, activities,…
Why Incomplete Documentation Is a Security Vulnerability in SaaS
Many SaaS teams pay more attention to encryption, firewalls, and compliance checks. They often overlook an essential asset: documentation. Documentations may not be as exciting as a new firewall or security tool. However, unclear, outdated, or incomplete setup guides, API…
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
“Ownership” is one of the harder concepts to define in the modern enterprise. This feels deceptive because, from a personal and human level, ownership is a rather straightforward concept. When you own something as a person, like your car or…
Developer Journey: Debug Complex Systems With Zero Context
Imagine this: You are a developer who has been tasked with solving a difficult problem that causes revenue loss by the minute. Your managers and leaders have pulled you from your current priorities and asked you to look at the…
Securing the Model Context Protocol (MCP): New AI Security Risks in Agentic Workflows
The Model Context Protocol (MCP), introduced in late 2024, is a significant move forward towards transforming the agentic AI revolution by providing a mechanism for them to connect with enterprise tools, APIs, and databases. The protocol presents a standardized way for large language models…
Infrastructure as Code (IaC) in a Multi-Cloud Environment: Consistency and Security Issues
Relevance of the Study Modern organizations are increasingly turning to cloud technologies to improve the flexibility, scalability, and efficiency of their IT infrastructure. One important tool in this process is Infrastructure as Code (IaC), which allows organizations to describe their…
Unpack IPTables: Its Inner Workings With Commands and Demos
We all know that the internet works by sending and receiving small chunks of data called packets. Back in the early days, when the internet was still in its infancy, packets were allowed to transfer freely across a connected world,…
Policy-as-Code for Terraform in Regulated Environments
Why Does It Matter? When we talk about a regulated workload, we talk about compliance. These compliances are industry standards that govern how data is processed, stored, and managed. That is why these workloads need to be clean and should…
Implementing Governance on Databricks Using Unity Catalog
Data governance has historically been the least glamorous part of data engineering. Engineers thrive on building things, designing scalable pipelines, curating high-quality datasets, and enabling machine learning models that deliver real business impact due to business demands. Governance, on the…
Scoped Filtering: A Practical Bridge to RBAC
You’re a startup fresh out of your development-focused cycle, starting to gain traction and demo your product to potential clients. As someone working at a freshly minted Series A company, I understand the priority: get the product working. In our…
5 Manual Testing Techniques Every Tester Should Know
Despite rapid advancements in test automation and the use of AI in software testing, manual testing is still a fundamental part of software Quality Assurance in 2025. Recent data from multiple industry reports confirm the ongoing value of manual testing…
Federated Learning: Training Models Without Sharing Raw Data
As machine learning programs require ever-larger sets of data to train and improve, traditional central training routines creak under the burden of privacy requirements, inefficiencies in operations, and growing consumer skepticism. Liability information, such as medical records or payment history,…
Basic Security Setup for Startups
Preamble I recently had a conversation with my friend about starting a new company. We discussed the various stages a company should go through to become mature and secure enough to operate in the modern market. This article will outline…
Digital Experience Monitoring and Endpoint Posture Checks Usage in SASE
In this article, I will go through the concepts of digital experience monitoring (DEM) and Endpoint Posture Checks and discuss how these essential capabilities are integrated into the SASE framework to enforce the zero trust principle. Together, these capabilities empower…
AI Readiness: Why Cloud Infrastructure Will Decide Who Wins the Next Wave
Everywhere I go, cloud and DevOps teams are asking the same question: “Are we ready for AI?” This article has been indexed from DZone Security Zone Read the original article: AI Readiness: Why Cloud Infrastructure Will Decide Who Wins the…