Category: DZone Security Zone

SRE vs. DevOps

This is a question that I hear on a fairly regular basis, not just internally but from external customers as well. So it’s one that I would like to help you walk through so that you can really figure out…

Identify and Fix XSS Vulnerabilities in Your Web App

What Is Cross-Site Scripting? Cross-Site Scripting (XSS) is a code-injection vulnerability that occurs in applications that process HTML when developers do not sanitize user input well enough before inserting it into an HTML template. It allows an attacker to insert…

Auditing Tools for Kubernetes

Kubernetes is an open-source container orchestration platform that has revolutionized the way applications are deployed and managed. With Kubernetes, developers can easily deploy and manage containerized applications at scale and in a consistent and predictable manner. However, managing Kubernetes environments…

8 Data Anonymization Techniques to Safeguard User PII Data

In today’s data-driven market, data translates to more power and opportunity for businesses. But as it is said, “With great power comes greater responsibility.” As more personal information is being collected and analyzed by organizations, the need to protect an…

What Is Istio Ambient Mesh?

What Is Istio Ambient Service Mesh? Istio, an open-source and widely used service mesh, is used to manage network and security for cloud-native applications. In September 2022, Istio project released ambient mesh — a modified and sidecar-less data plane for…

VPN Architecture for Internal Networks

In today’s hyperconnected digital landscape, secure internal networks have become a cornerstone of corporate infrastructure. This crucial aspect of operations is often bolstered by robust VPN technologies, such as OpenVPN.  As a leading solution in the realm of VPN, OpenVPN’s…

How to Handle Secrets in Kubernetes

Kubernetes has become the de facto standard for container orchestration, enabling organizations to build, deploy, and scale modern applications with efficiency and agility. As more organizations adopt Kubernetes, the need for proper security and management of sensitive data within these…

What Is Istio Service Mesh?

Most organizations prefer to deploy containerized applications into K8s because of its scalability and flexibility. But as the number of microservices increased and application pods are distributed across multiple clusters and cloud providers, managing and scaling them has become complex.…

Build a Cloud Tagging Strategy in 5 Steps

Organizations have grappled with the cloud tagging challenge practically since the rise of cloud computing. Tags are the only mechanism that allows you to understand the cost of your cloud environment. But that’s not all. Cloud tagging also plays a key…

How To Conduct a Secure Code Review

Secure code reviews are crucial for building applications that protect users, developers, and data. The first step in conducting one is understanding the specific goals and a few essential tips for success.  What Is a Secure Code Review? A secure…

How To Design Reliable IIoT Architecture

Crafting a reliable IIoT design is all about building on foundational architecture layers and customizing them for specific network needs. How an IIoT network is organized influences performance, optimization, and security. You can ensure you get the most out of…

Why Using Generative AI for OKRs Is Generally a Bad Idea

Setting objectives and key results (OKRs) is a powerful way to align an organization’s efforts toward a common goal. However, as the amount of data and complexity of objectives increase, it can become challenging to set effective and achievable goals.…

Insider Threats and Software Development: What You Should Know

Insider threats are a multi-million-dollar problem for many organizations, impacting organizations of all sizes and sectors. Although the methods of attack can vary, the primary types of incidents—theft of intellectual property (IP), sabotage, fraud, espionage, unintentional incidents, and misuse—continue to…

Safeguarding Your Data Under GDPR Regulations

GDPR, or the General Data Protection Regulations, is a set of rules that dictate how organizations store and use personal data. Since being introduced in 2018, GDPR has become the center of attention in data protection. Primarily due to how…

Cyphercon 6: Staying Up Late for Cybersecurity

When you think of Milwaukee, you might think of squeaky cheese curds, polka music, and the Bronze Fonz. But now, I will always associate this city on the lake with cybersecurity, thanks to Cyphercon 6, which was held on March…

How Virtualization Helps Security

The 21st century has given rise to a wealth of advancements in computer technology. Among these are virtual tools and programs that have applications in almost every industry imaginable. One area that virtualization technology is making a huge impact is the…

Global Supply Chain With Kafka and IoT

A supply chain is a complex logistics system that converts raw materials into finished products distributed to end-consumers. The research company IoT Analytics found eight key technologies transforming the future of global supply chains. This article explores how data streaming…

System Testing and Best Practices

A system is a collection of interconnected components that work together to perform a defined function or set of functions. The components can be hardware, software, firmware, or a combination.  In software, a system can refer to a collection of…

Securing Access, Encryption, and Storage Keys

The cloud platforms provide customers with technology and tools to protect their assets, including the most important one — data. At the time of writing, there’s a lot of debate about who’s responsible for protecting data, but generally, the company…

What Is mTLS? How To Implement It With Istio

This is a detailed guide on mTLS and how to implement it with Istio service mesh. We will be covering the following topics here: Understanding mTLS protocol wrt TCP/IP suite SSL vs TLS vs mTLS Why is mTLS important? Use-cases…

How To Handle AWS Secrets

Secure management of AWS secrets is essential for protecting sensitive data and preventing unauthorized access to critical systems and applications. In today’s rapidly escalating threat landscape, organizations must ensure their secrets are appropriately managed and safeguarded. The AWS SDK, also…

How To Scan and Validate Image Uploads in Java

Direct image upload processes create a highly efficient path between client-side users and a website’s underlying file storage instances, significantly benefiting both ends of the client/web service relationship. Due largely to the ever-increasing availability (and affordability) of cloud storage resources…

SASE: The Ultimate Guide To Secure Access Service Edge

As enterprises move towards the cloud and mobility becomes the norm, networking and security solutions must evolve accordingly. Secure Access Service Edge (SASE) enters the picture here. SASE is an up-and-coming technology category that aims to offer specific network security…

The Emerging World of Data Security Posture Management

The post-COVID world has seen more organizations adopt remote and hybrid work, allowing employees the flexibility to work from anywhere (WFA). While the move to a remote-hybrid work model for business operations comes with several benefits — like reduced cost…

Why APIs Will Be This Year’s Most Targeted Service

Cybersecurity threats are front of mind for many organizations, and with good reason. Cybercrime is rising and is expected to reach a staggering $10.5 trillion annually by 2025. API exploits are an all-too-common approach and will be the most targeted…

Why Backup Jira: Is There Any Risk of Data Loss?

If you work in IT, then you definitely know why using such tools as Jira is more than a must. Let’s look at the numbers that Atlassian gives us… over 65K companies worldwide rely on Jira Software. Unfortunately, though, have…

Privacy Risk of ChatGPT for Software Developers

ChatGPT is a relatively new technology that is set to revolutionize how software developers interact with AI. With its ability to generate code autonomously from text, ChatGPT could drastically reduce development time and complexity while allowing developers an unprecedented level…

The Importance of Software Security

In today’s world, where everything is connected to the internet, software security has become an essential aspect of software development. Software security is the process of designing, implementing, and testing software to ensure that it is secure from unauthorized access,…

Types of Software Bugs

In software, a bug is an error in the program code that often originates from human error. The most common types of bugs include functional, Performance, logic, syntax, and Syntax bugs.  A bug means a software or application failure, not working as expected results,…

How To Manage Vulnerabilities in Modern Cloud Native Applications

Vulnerability management is a proactive approach to identifying, managing, and mitigating network vulnerabilities to improve the security of an enterprise’s applications, software, and devices. It includes identifying vulnerabilities in IT assets, assessing risks, and taking appropriate action on systems and networks. Organizations…

Implementing RBAC in Quarkus

REST APIs are the heart of any modern software application. Securing access to REST APIs is critical for preventing unauthorized actions and protecting sensitive data. Additionally, companies must comply with regulations and standards to operate successfully. This article describes how…

Cybersecurity: Why It’s More Important Than Ever

In today’s world, cyberattacks have become a major threat to individuals and organizations alike. From phishing scams to ransomware attacks, cybercriminals are constantly finding new ways to exploit vulnerabilities in digital systems. This is why cybersecurity has become more important…

Benefits of Manual Penetration Testing

Cybersecurity is vital to maintaining a network and developing secure software, and penetration testing is one of the top ways to ensure your cybersecurity measures are up to par. Using this form of testing, you will understand where potential weaknesses lie…

Azure Data Box

Azure Data Box is a product offered by Microsoft Azure that helps organizations transfer large amounts of data securely and efficiently to and from Azure. It is similar to AWS Snowball Edge or/ Google Transfer Appliance. The purpose of the Azure…

Build a Web3 Ticketing System and Disrupt Online Ticketing

A popular and practical use case for web3 is generating tickets to live events. Blockchains such as Ethereum can guarantee the ownership, originator, and authenticity of a digital item, effectively solving the problem of counterfeit tickets. While major players such…

10 Best Practices for Using Kubernetes Network Policies

As more applications are deployed in Kubernetes clusters, ensuring that traffic flows securely and efficiently between them becomes increasingly important. Kubernetes Network Policies are a powerful tool for controlling traffic flow at the IP address or port level, but implementing…

Zero Trust Network for Microservices With Istio

Security was mostly perimeter-based while building monolithic applications. It means securing the network perimeter and access control using firewalls. With the advent of microservices architecture, static and network-based perimeters are no longer effective. Nowadays, applications are deployed and managed by…

How to Handle Secrets in Jenkins

Jenkins is a popular open-source automation server that is widely used for building, testing, and deploying software. It allows developers to automate many aspects of their software development process, including continuous integration and continuous deployment. As with any continuous integration…

Data Encryption: Benefits, Types, and Methods

Data encryption is one of the most prevalent digital safety measures since it safeguards information and reduces the impact of cyber threats. Modern organizations incorporate encryption in various daily activities, such as communication and payments. That said, it is essential…

Tornado vs. FastAPI: Why We Made the Switch

As developers, we are always on the lookout for tools and technologies that can improve our products and services. In this article, we will discuss the key differences between Tornado and FastAPI, two popular web frameworks for Python. Additionally, we…

Breaking the Wall Between Dev, Sec, and Ops

DevSecOps, in layman’s language, is a combined form of software development, security, and software operations. According to Gartner’s research, “It is estimated that at least 95% of cloud security failures through 2022 will be the fault of the enterprise”. Therefore,…

OpenShift vs. Kubernetes: The Unfair Battle

The most popular container orchestration software alternatives available today are OpenShift and Kubernetes.  In this article, we are going to be comparing OpenShift and Kubernetes, and let me tell you, the comparison is far from fair. Indeed, comparing OpenShift and Kubernetes…

From Zero to Hero: Learning Web3 With Infura and Python

Web3, blockchain technology, and cryptocurrency are all fascinating topics. The technology, applications, ecosystem, and the impact on society are all moving at incredible speeds. In this article, we will talk about learning web3 development from the point of view of…

Shadow and Zombie APIs: How to Minimize Vulnerabilities

Application Programming Interfaces (APIs) are the backbone of modern software development and are now vital strategic assets for large enterprises. However, with increasing API proliferation and subsequent sprawl, APIs can also pose significant security risks for enterprises. Shadow or zombie…

5 DNS Troubleshooting Tips for Network Teams

“Set it and forget it” is the approach that most network teams follow with their authoritative Domain Name System (DNS). If the system is working and end-users find network connections to revenue-generating applications, services, and content, then administrators will generally…

HIPAA Compliance Testing in Software Applications

Health Insurance Portability and Accountability Act (HIPAA) regulations must be followed by any software used in the healthcare industry that manages electronic patient health information (ePHI). Federal law outlines requirements to guarantee that private patient health information is not disclosed…

GitHub Exposed a Private SSH Key: What You Need to Know

Secrets leakage is a growing problem affecting companies of all sizes, including GitHub. They recently made an announcement on their blog regarding an SSH private key exposure: [Last week, GitHub] discovered that GitHub.com’s RSA SSH private key was briefly exposed…

How To Build on Linea: A ZK-rollup on Ethereum

There are many new L2s emerging in the web3 ecosystem with the goal of improving Ethereum’s scalability. These L2s use a variety of solutions to create layers on top of Ethereum that are faster, cheaper, and yet still benefit from…

Improve AWS Security and Compliance With CDK-nag?

AWS Cloud Development Kit (AWS CDK) is a powerful tool that allows developers to define cloud infrastructure in code using familiar programming languages like TypeScript, Python, and Java. However, as with any infrastructure-as-code tool, it’s important to ensure that the…

How To Build for Payment Processing Resiliency

If you’re developing applications for a business, then one of your most important tasks is collecting payment for goods or services. Sure, providing those goods or services is essential to keeping customers happy. But if you don’t collect payments, your…

Container Security: Top 5 Best Practices for DevOps Engineers

Containerization has resulted in many businesses and organizations developing and deploying applications differently. A recent report by Gartner indicated that by 2022, more than 75% of global organizations would be running containerized applications in production, up from less than 30%…

Attaining Document Security in FileNet Content Management System

FileNet is a document management system developed by IBM that allows organizations to manage and store their digital content. Document Security is an essential aspect of any document management system, including FileNet.  Important Considerations for FileNet Security 1. Authentication: FileNet provides…

Choosing the Right IAM Solution

Identity and Access Management (IAM) is one of the critical components of any commercial software. As the name suggests, IAM solutions cover the identity of the users, their roles, privileges, authentication, and authorization. Long story short, IAM is based on…

Is TestOps the Future of Software Testing?

TestOps is an emerging approach to software testing that combines the principles of DevOps with testing practices. TestOps aims to improve the efficiency and effectiveness of testing by incorporating it earlier in the software development lifecycle and automating as much…

How to Use HashiCorp Boundary for Secured Remote Access

As companies rely increasingly on multiple applications residing in different regions and networks, security has become a critical concern. The process of accessing these applications can be complex and challenging, particularly when they are running in different data centers and…

Dependency Poker for Scrum Teams

Dependency Poker is an Agile game — similar to planning poker — that enables teams to identify and manage dependencies in the development process. It can be utilized in Backlog Refinement or SAFe’s PI Planning to enhance collaboration and reduce project risks.  The…