Working with multiple threads is one of the most complex problems we may encounter in our daily work. When put against the wall of multithreading, most people right away reach out for blocking approaches. In Java, it takes the form…
Tag: DZone Security Zone
Software Supply Chain Security Regulations From a DevSecOps Perspective
Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Software Supply Chain Security: Enhancing Trust and Resilience Across the Software Development Lifecycle. High-profile software supply chain attacks like SolarWinds, Log4j, and MOVEit highlight the…
How to Expose IBM FS Cloud Container App to Public
Are you looking for a way to expose your containerized applications to the internet without breaking compliance with IBM Cloud for Financial Services? This guide walks through how to do just that. It shows how to securely expose your apps…
AI-Driven Threat Hunting: Catching Zero Day Exploits Before They Strike
Picture this: you’re a cybersecurity pro up against an invisible enemy. Hidden in your network are zero-day exploits, which represent unknown vulnerabilities that await their moment to strike. The time you spend examining logs becomes pointless because the attack might…
Burn that List: Smarter Use of Allowlists and Denylists in Multi-Tenant Systems
In multi-tenant systems—whether you’re managing an API gateway, identity platform, or SaaS product—access control is essential. Two of the most widely used tools for managing that access are allowlists and denylists. These mechanisms define who or what is permitted or rejected,…
Practical Steps to Secure the Software Supply Chain End to End
Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Software Supply Chain Security: Enhancing Trust and Resilience Across the Software Development Lifecycle. The software supply chain has rapidly evolved into a critical vulnerability point…
How Hackers Exploit Spring Core Vulnerability in 2025: Proactive Measures to Detect Emerging Cyber Threats
API management has emerged as a critical and strategic factor in staying ahead of the market leaders. However, digital transformation has significant disadvantages, such as opening the door to hackers. Hackers have been quick to take advantage of a serious…
11 Best Practices for Developing Secure Web Applications
Applications related to the web enable business, e-commerce, and user interactions to be the backbones of the e-world of a more and more digital world. In this growth, there is one thing that has gone up, and that is web…
AI-Powered Security for the Modern Software Supply Chain: Reinforcing Software Integrity in an Era of Autonomous Code and Expanding Risk
Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Software Supply Chain Security: Enhancing Trust and Resilience Across the Software Development Lifecycle. In today’s software landscape, the supply chain has grown from a controlled…
The Invisible Risk in Your Middleware: A Next.js Flaw You Shouldn’t Ignore
Web development in 2025 has evolved at an incredible pace. We’ve gone from clunky monoliths to sleek, scalable apps powered by frameworks like Next.js, which millions of developers now rely on for building modern, server-rendered React applications. But as our…
Compliance Automated Standard Solution (COMPASS), Part 8: Agentic AI Policy as Code for Compliance Automation With Prompt Declaration Language
(Note: A list of links for all articles in this series can be found at the conclusion of this article.) In the last two blog posts of this multi-part series on continuous compliance, we presented Compliance Policy Administration Centers (CPAC)…
Maximizing Return on Investment When Securing Our Supply Chains: Where to Focus Our Limited Time to Maximize Reward
Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Software Supply Chain Security: Enhancing Trust and Resilience Across the Software Development Lifecycle. The goal of DevOps and DevSecOps — and whatever future contractions come…
Securing Software Delivery: Zero Trust CI/CD Patterns for Modern Pipelines
Modern CI/CD pipelines are essential for rapid and reliable software delivery. But as pipelines automate more stages of the development lifecycle—from code validation to production deployment—they have also become a major target for exploitation. Traditional pipelines often operate on broad…
Advanced SSL Certificate Troubleshooting for Windows: Chain of Trust, Debugging, and Best Practices
SSL/TLS certificates are foundational to secure communications on the internet. However, Windows environments present unique challenges that go beyond basic certificate installation and troubleshooting. If you’re already familiar with SSL fundamentals, you’ll want to know how to handle complex certificate…
The 7 Biggest Cloud Misconfigurations That Hackers Love (and How to Fix Them)
Look, I’ve been in cybersecurity for over a decade, and I’m tired of seeing the same preventable disasters over and over again. Cloud security breaches aren’t happening because of some sophisticated nation-state actor using a zero-day exploit. They’re happening because…
AI-Powered Ransomware and Malware Detection in Cloud Environments
Cloud platforms have become prime targets for ransomware and malware attacks, which can paralyze businesses by encrypting data or exfiltrating sensitive information. Traditional security tools such as signature-based antivirus and rule-based systems often struggle to detect advanced threats that mutate…
The Cybersecurity Blind Spot in DevOps Pipelines
Speed kills. In software development, that axiom has never been more literal. DevOps pipelines surge through modern enterprises like digital bloodstreams — pumping code, configurations, and deployments at breakneck velocity. Continuous integration and continuous delivery are the promises of rapid…
Modernize Your IAM Into Identity Fabric Powered by Connectors
It’s no secret that technology is evolving much faster than our traditional Identity and Access Management systems can handle. These legacy systems were designed for simpler times, when everything was hosted locally and security was perimeter-based. So, in an era…
Zero-Trace Paradigm: Emerging Technologies in Personal Data Anonymization
Emerging technologies like homomorphic encryption and zero-knowledge proofs can definitely help organizations approach zero-trace personal data anonymization. These and similar techniques can bring datasets to a near-zero-trace status, even achieving it in limited cases. There’s a major force that’s acting…
A Keycloak Example: Building My First MCP Server Tools With Quarkus
Recently, I explored how the Model Context Protocol (MCP) is gaining traction in the Java ecosystem, with frameworks like Spring AI, Quarkus, and LangChain4j starting to adopt it for integrating language models via standardized interfaces. It was also time to…