Tag: DZone Security Zone

Infrastructure as Code: Exploring Terraform’s Dominance

Infrastructure as Code (IaC) has emerged as a pivotal practice in modern software development, enabling teams to manage infrastructure resources efficiently and consistently through code. This analysis provides an overview of Infrastructure as Code and its significance in cloud computing…

Cloud Security in Hybrid and Multi-Cloud

Increasing adoption of SaaS Applications and Web Based solutions created a demand for data and resource sharing. Cloud computing provides a combination of infrastructure, platforms, data storage, and software as services. It has replaced grid computing over the years and…

Penetration Testing: A Comprehensive Guide

Cybersecurity threats are real, and with the enhanced proliferation of digitization in the business landscape today, websites have become an integral part of business communication with customers and partners. Therefore, companies look for new and secure ways to protect their…

How To Approach Dependency Management in Java [Video]

In the video below, we will cover real-life considerations when working with dependencies in Java: How to find and trust the right dependencies How to consistently keep them updated How to protect against vulnerabilities How to handle team backlash against…

jQuery vs. Angular: Common Differences You Must Know

A robust digital presence is essential in today’s business landscape. Web development evolves constantly with new frameworks and libraries for dynamic web applications. These platforms connect with your audience and boost business productivity. Embracing these advancements is vital for success…

Understanding Package.json II: Scripts

Welcome to the world of Javascript development, where building, testing, and deploying applications can be complex and time-consuming. As developers, we strive to automate these tasks as much as possible, and that’s where npm scripts come in. npm scripts are…

The Intersection of CDP and AI: How Artificial Intelligence Is Revolutionizing Customer Data Platforms

In today’s data-driven world, Customer Data Platforms (CDPs) play a pivotal role in helping businesses harness and utilize customer data effectively.   These platforms consolidate data from various sources, providing valuable insights into customer behavior and preferences. They enable businesses to comprehensively understand their customers, facilitating targeted marketing…

How to Structure a Platform Team – An Illustrative Model

Platform teams are an integral part of an IT solution delivery organization.  Every IT organization has a way of structuring its platform team based on its context and multiple considerations, including alignment with the Development or Operations of other units,…

Evolving Data Strategy at Major Canadian Bank

With the ever-increasing amount and variety of data, constantly growing regulations and legislation requirements, new capabilities and techniques to process the data, to become a data-driven organization, CIBC goes through enormous changes in all aspects of leveraging, managing, and governing…

The Future of Web Development: Predictions and Possibilities

The universe of web improvement has gone through a beautiful development since its initial days during the commencement of the web. The method involved with creating and overseeing sites and online applications has gone through astounding progressions, molding the computerized…

Safeguarding the IoT Landscape With Data Masking Techniques

As businesses aim to provide personalized experiences to their customers, they are increasingly integrating connected IoT devices into their operations. However, as the IoT ecosystem expands, protecting data from malicious individuals who may try to access and misuse personal information…

How To Handle Dependencies Between Pull-Requests

In the dynamic environment of software development, effective management of dependencies between pull requests (PRs) is pivotal to enabling smooth collaboration and seamless code integration.  But let’s face it, juggling dependencies manually can be a real challenge! This article has…

How Developers Can Work With Generative AI Securely

If you work in software development, or indeed within any sector of the technology industry, you will have undoubtedly been part of discussions about, read headlines on, or even trialed a platform for generative artificial intelligence (AI). Put simply, this…

zkEVMs and the Future of Blockchain Scalability

The hype around blockchain technologies may have quieted, but the builders are still building. The toughest technical problems that kept blockchain from mass adoption over the past few years—slow and expensive transactions—are being solved by layer 2s. zkEVMs, and Linea…

Zero Trust: Storage and Search

If we look at the banking market (7.5 trillion euro in 2022) and insurance ($5.6 trillion in 2022) applications, we will find it very regulative. Responsibility to act with personal data securely leads many companies to have a private cloud…

A Deep Dive Into Token-Based Authentication and OAuth 2.0 in MQTT

This article delves into additional authentication methods beyond those covered in previous articles. Specifically, we will explore token-based authentication and OAuth 2.0, explaining their concepts and demonstrating their implementation in MQTT. This article has been indexed from DZone Security Zone…

The Use of Biometrics as a Cybersecurity Method

Introduction to Biometrics Biometrics measures and analyses an individual’s physical and behavioral characteristics. It is a technology used for proper identification and access control of people under surveillance. The theory of biometric authentication is that everybody can be accurately identified…

Leveraging Enhanced Authentication for MQTT Security

In previous posts, we introduced that through the Username and Password fields in the MQTT CONNECT packet, we can implement some simple authentication, such as password authentication and token authentication. This article will delve into a more advanced authentication approach…

Oracle Maximum Security Architecture

In today’s world, databases are valuable repositories of sensitive information, and attackers are always on the lookout to target them. This has led to a rise in cybersecurity threats, making it essential to have proper protection measures in place. Oracle…

Third-Generation Data Platforms: The Lakehouse

Data Platform Evolution Initially, data warehouses served as first-generation platforms primarily focused on processing structured data. However, as the demand for analyzing large volumes of semi-structured and unstructured data grew, second-generation platforms shifted their attention toward leveraging data lakes. This resulted in…

Fortifying MQTT Communication Security With SSL/TLS

In previous articles, we explored authentication and access control mechanisms. Now it’s time to shine a light on the crucial role of Transport Layer Security (TLS) in fortifying MQTT communication. This article will focus specifically on TLS and its ability…

Secure Code Reviews

Secure code review is essential for ensuring software applications’ security and integrity. By examining the codebase for potential vulnerabilities and weaknesses, developers can identify and address security issues before malicious actors exploit them. This article will discuss some best practices…

Top 9 DevOps Trends

When we say DevOps, it quickly conjures up an image of a development and operations team that works together — collaboratively and communicatively. DevOps uses tools like automation, continuous integration, and monitoring. This way, the software development process picks up speed and…

DevOps Security Best Practices for Your SaaS Application

DevOps security is a set of practices that integrate security processes, people, and DevOps security tools into the development pipeline, enabling organizations to deliver software in a secure environment continuously. Whether you call it DevSecOps, network security, cyber security, DevOps and…

Leveraging DevSecOps To Elevate Cloud Security

Traditionally, security was often an afterthought in the software development process. The security measures were implemented late in the cycle or even after deployment. DevSecOps aims to shift security to the left. In DevSecOps, security is incorporated from the earliest…

Securing RESTful Endpoints

Welcome back, developers and security enthusiasts! In the previous blog, “Implementing RESTful endpoints: a step-by-step guide,” we covered the essential foundations of API security, including authentication, authorization, and secure communication protocols. Now, it’s time to level up and delve into advanced…

Playing Around With AWS Vault for Fun and Profit

AWS Vault is an open-source tool by 99Designs that enables developers to store AWS credentials in their machine keystore securely. After using it for a while at Jit, I decided to dig deeper into how it works and learned a…

API’s Role in Digital Government, 10 National Best Practices

As the digital revolution reshapes government operations worldwide, Application Programming Interfaces (APIs) have emerged as a critical tool in driving digital transformation. Through APIs, governments can ensure smoother interoperability between various systems, facilitate data sharing, and innovate public services. Here,…

SAAS Security: 6 Best Practices and Strategies

The rise of cloud computing and SaaS (Software as a Service) has dramatically reshaped the digital landscape, offering companies numerous benefits like scalability, cost-efficiency, and flexibility. In fact, the five largest SaaS companies in the U.S. have a combined market…

Angular v16: A New Era of Angular Development

Angular v16, the latest major release of the Angular framework, introduces a number of exciting new features and improvements. These features are designed to make Angular development more efficient, scalable, and secure. Rethinking Reactivity One of the most significant changes…

How DevOps Teams Can Boost Kubernetes Performance

Kubernetes (also called K8s) remains the most in-demand container for developers. Originally developed by engineers at Google, K8s has achieved global fame as the go-to solution for hosting across on-premise, public, private, or hybrid clouds. Insights from Statista show the…

How To Scan GCP Storage Files for Threats Using Go

As enterprise cloud storage solutions steadily gain momentum across global markets, the anti-virus and malware security policies deployed to protect these pay-per-scale services become more and more robust. Naturally, the taller the castle wall becomes, the higher the siege ladder…

Introduction to Cloud Database

Introduction Cloud databases are the future of data storage and management. With the advancement of technology, businesses and organizations have recognized the need to store data on the cloud. The cloud database is a type of database that is stored…

Sticky Sessions With Apache APISIX — The Demo

Last week, we described the concept behind sticky sessions: you forward a request to the same upstream because there’s context data associated with the session on that node. However, if necessary, you should replicate the data to other upstreams because…

Evolving DORA Metrics: Discussing Emerging Trends and Advancements in DORA Metrics, Such as Incorporating Security and Quality Metrics Into the Assessment Framework

In the fast-paced world of software development, DevSecOps principles have emerged as a crucial approach for organizations to streamline their software delivery processes, improve collaboration between teams, and achieve faster time-to-market. In this context, the DevSecOps Research and Assessment (DORA)…

Kubernetes: Advantages and Disadvantages

Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications. It has gained popularity among developers and enterprises for its ability to provide a scalable, reliable, and efficient infrastructure for deploying modern applications.…

Microservices Security in a Nutshell

Microservices architectures have gained popularity due to their scalability, agility, and flexibility. However, with these architectures’ increased distribution and complexity, ensuring robust security measures becomes paramount. The security of microservices extends beyond traditional approaches, requiring a comprehensive strategy to protect…

Data Protection: Utilizing the Power of SIEM and CASB

The requirement for monitoring, identifying harmful behaviors, and preventing or notifying of these activities is growing quickly as the number of malicious insider and external attacks rises. The threat landscape is constantly changing, making strong security monitoring and detection solutions…

How To Secure RESTful Web Services

RESTful APIs have become a crucial component of modern web development, providing a way to interact with resources and data through a simple and consistent interface. However, as with other web-based applications, security must be a top priority when developing…

What Are Software Whitelisting and Blacklisting?

In the world of computer security, whitelisting and blacklisting are two common methods used to control access to resources. These methods are used to prevent unauthorized access to a system and to ensure that only approved applications and services are…

Data Governance: Data Architecture (Part 2)

Data governance is a framework created by the collaboration of people with various roles and responsibilities working towards establishing the processes, policies, standards, and metrics to achieve the organization’s goals. These goals can range from providing trusted data for businesses…

Top 6 Benefits of AWS Certification

The worth of the Cloud Computing market is estimated to hit USD 1,614.10 billion with a projected CAGR of 17.43 percent by the year 2030. The big giants that hold the market share in the cloud market are AWS, Google Cloud Platform,…

Risk Assessment Using Blockchain

Blockchain technology is an emerging technology field, and to explore its wide use of application, several companies have a dedicated research teams for the same. One such field that could take advantage of this technology is risk assessment. Blockchain technology…

Amazon Instance Connect Endpoint

In the realm of cloud computing, Amazon Web Services (AWS) EC2 instances have gained immense popularity for their scalability, flexibility, and reliability. Managing these instances often requires remote access for administrative tasks, debugging, or troubleshooting. To address the security concerns…

Exploring API Headers

Continuing our exploration of APIs and their fascinating capabilities, we delve deeper into the realm of API headers. Building upon the insights shared in our previous blog, ‘Using Query Parameters and Headers in REST API Design,’ where we’ve discussed that…

Less Frequently Used HTTP Methods

Understanding less frequently used HTTP methods is crucial for comprehensive API development. While widely known methods like GET and POST form the foundation of web communication, there are specialized methods that are not as commonly used. These methods have specific…

Exploring the Need for Object-Oriented Programming

Object-oriented programming (OOP) has become a fundamental paradigm in software development, revolutionizing the way we design, implement, and maintain complex systems. By organizing code into reusable objects with their own properties and behaviors, the four pillars of OOP are code organization,…

How To Improve GraphQL API Security

The open-source GraphQL query language has a ton to offer enterprises seeking a more scalable, flexible, developer-friendly, and modernized approach to API-driven development. That said, because I’m a security professional, I tend to focus on the new opportunities GraphQL also…

TDD and the Impact on Security

Test-driven development (TDD) is a software development approach that prioritizes writing automated tests while creating the actual code. There follows a cycle of writing a failed test, writing the code to make the test pass, and then refactoring the code.…

It’s Elementary Privacy, Watson!

In today’s (mostly) digital world, maintaining data privacy and data security should be an ongoing discussion in all businesses, especially those developing applications, both internal business shops and software shops selling solutions. That said, compliance and privacy issues are not…

Ory vs Keycloak vs SuperTokens

Compared to a couple of years ago, open-source authentication has seen huge progress. In this post, we’ll compare three of the leading open-source authentication providers – Ory, Keycloak, and SuperTokens. Each of these providers has its own set of pros…

How AI Is Improving Cybersecurity

AI is already preventing the most common types of cyberattacks in several ways. Here are four examples: Malware detection: AI detects malware by analyzing its code or behaviour. For example, AI can be used to identify known malware signatures or…

Adhering to Privacy Laws When Preserving System History

Privacy laws worldwide prohibit access to sensitive data in the clear such as passport numbers and email addresses. It is no different when persisting to operational logs. One approach can be to anonymize the data before persisting it. However, this…

API Security Is a Hot Topic, Here’s Why

Preparing for Black Hat 2023, it seems like API security will be a key issue. Here’s what you need to know. What’s an API? An API, or application programming interface, is a set of definitions and protocols for building and…

Enterprise DevOps: Importance and Key Benefits You Need to Know

Many entrepreneurs consider DevOps solutions useful for startups and technology companies. The reason behind this notion is the chief objective of DevOps implementation, which is to help companies build their culture or establish cloud-native roots. However, the reality is completely…

What Happens When You Type a URL Into Your Browser?

This article aims the following audiences: Tech workers Students Product managers Marketing team Sales team There are no prerequisites to reading this article. I assume that you have used a web browser to navigate across the internet.  This article has…

AI Threats Today: The Unseen Challenges in Our Automated World

As our world becomes increasingly automated, the role of artificial intelligence (AI) in various domains has grown exponentially. While AI brings numerous benefits and advancements, it also introduces new threats and challenges in cybersecurity. This article will delve into the…

Real-World Cyberattacks Targeting Data Science Tools

As the move to the cloud accelerates, organizations increasingly rely on large data teams to make data-driven business decisions. To accomplish their jobs, data professionals work with dedicated tools that are often deployed to development and production environments and are…