DLP, or Data Loss Prevention, is a proactive approach and set of technologies designed to safeguard sensitive information from unauthorized access, sharing, or theft within an organization. Its primary goal is to prevent data breaches and leaks by monitoring, detecting,…
Category: DZone Security Zone
From Chaos to Control: Nurturing a Culture of Data Governance
The evolving nature of technology, increased data volumes, novel data regulations and compliance standards, and changing business landscapes in the last decade are resulting in data chaos and inconsistency for many enterprises, and that is resulting in enterprises going towards…
Digital Transformation in Engineering: A Journey of Innovation in Retail
Digital transformation is the goal of each business in the retail industry today. It is the tool used by various businesses across the world to understand and modify their business models. A digital transformation is a strategic approach through which…
Legal and Compliance Considerations in Cloud Computing
Cloud computing has transformed software development and management, facilitating unparalleled scalability, flexibility, and cost efficiency. Nevertheless, this paradigm change has faced challenges, primarily legal and compliance issues. Data, services, and infrastructure often reside in a nebulous space, not directly owned…
Three Compliance Management Solutions for Technology Decision-Makers
With growth comes more compliance responsibilities. Larger user bases attract the risk of data breaches, with malicious actors paying more attention to companies that are on the rise. Regulatory frameworks like GDPR, Quebec Law 25, and the India Data Protection…
AI for Web Devs: Addressing Bugs, Security, and Reliability
Welcome back to this series where we have been learning how to build web applications with AI. So far in this series, we’ve created a working app that uses AI to determine who would win in a fight between two…
Five Best Data De-Identification Tools To Protect Patient Data and Stay Compliant
Data de-identification is a necessary exercise healthcare institutions and organizations dealing with personally identifiable information must implement. With the help of data de-identification software, it has become easier to mask personal data that can put an individual at risk. De-identifying…
SIEM Volume Spike Alerts Using ML
SIEM stands for Security Information and Event Management. SIEM platforms offer centralized management of security operations, making it easier for organizations to monitor, manage, and secure their IT infrastructure. SIEM platforms streamline incident response processes, allowing security teams to respond…
Pinterest’s Transition to HTTP/3: A Boost in Performance and Reliability
In a recent announcement, Pinterest revealed its successful migration from HTTP/2 to HTTP/3. This marked a significant improvement in its networking infrastructure. The aim was to enhance the user experience and improve critical business metrics by leveraging the capabilities of…
Rethinking Data Governance: Metrics for Meaningful Outcomes
For years, data governance has been obsessed with a metric that feels more like accounting than strategic decision-making: coverage. Data Governance tool vendors educated a generation of governance professionals to diligently track the percentage of documented data, chasing a completion…
Device and Data Security in Embedded Systems
Embedded systems are at the core of our modern-age technology, powering everything from smart electronic devices to connected applications. These systems have become crucial in various industries enabling advanced applications. However, the security of these devices has become a major…
NFT Wallets Unleashed: A Data Structures and Application Design Journey
Whether or not you’re caught up in the NFT hype, as a software engineer, staying abreast of recent innovations is crucial. It’s always fascinating to delve into the technologies underpinning such trendy features. Typically, I prefer to let the dust…
Edge Security for IoT: Protecting Data at the Edge
The Internet of Things (IoT) has rapidly expanded the landscape of connected devices, revolutionizing industries ranging from healthcare to manufacturing. However, as the number of IoT devices continues to grow, so do the security challenges. One crucial aspect of IoT…
Data Governance and DevOps
In the age of information, “data is treasure.” With trillions of datasets encapsulating the world, data is fragile. Safeguarding data is imperative, and data governance ensures data is managed, safe, and in compliance. Data Governance Data governance overlooks data. It…
Simplifying Access: The Role of Single Sign-On (SSO) in Cloud Computing
Cloud computing has transformed how businesses access and manage their data and apps. With the growing complexity of cloud-based ecosystems, faster access and increased security are critical. Single Sign-On (SSO) becomes a game changer in this situation. We will look…
TPM Chips and the Use of TPM in Virtualization Technology
The Trusted Platform Module (TPM) is an important component in modern computing since it provides hardware-based security and enables a variety of security features. TPM chips have grown in relevance in both physical and virtual contexts, where they play a…
Securing the Digital Frontier
In an era where digitalization permeates every facet of our lives, the interplay between technology, society, and regulations becomes increasingly critical. As we navigate through a world brimming with data, understanding the evolving landscape of data protection is not just…
How To Implement Supply Chain Security in Your Organization
In the ever-evolving landscape of digital innovation, the integrity of software supply chains has become a pivotal cornerstone for organizational security. As businesses increasingly rely on a complex web of developers, third-party vendors, and cloud-based services to build and maintain…
A Framework for Maintaining Code Security With AI Coding Assistants
Over the past few years, AI has steadily worked its way into almost every part of the global economy. Email programs use it to correct grammar and spelling on the fly and suggest entire sentences to round out each message. Digital…
Safeguarding Privacy: A Developer’s Guide to Detecting and Redacting PII With AI-Based Solutions
PII and Its Importance in Data Privacy In today’s digital world, protecting personal information is of primary importance. As more organizations allow their employees to interact with AI interfaces for faster productivity gains, there is a growing risk of privacy breaches and…
Monitoring Dynamic Linker Hijacking With eBPF
Extended Berkeley Packet Filter (eBPF) is a programming technology designed for the Linux operating system (OS) kernel space, enabling developers to create efficient, secure, and non-intrusive programs. Unlike its predecessor, the Berkeley Packet Filter (BPF), eBPF allows the execution of…
Securing the Digital Frontline: Advanced Cybersecurity Strategies for Modern Web Development
Websites and web applications are more than just digital interfaces; they are gateways through which sensitive data, personal information, and critical business operations flow. As such, ensuring their security is paramount. The landscape of cybersecurity is not static; it’s a…
Repository and Metadata Backup, Disaster Recovery, And Compliance: The Unbreakable Trio
Who said that there is no link between backup and compliance? Why should you have a compliant backup? What is more, why a Disaster Recovery is an inalienable part of a company’s compliance? What place here is given to Disaster…
Comprehensive Gun Detection for Schools: An AI-Based Approach Leveraging Audio and Video Insights
This article discusses a new approach to detecting guns in educational institutions by leveraging visual and auditory cues. The system below combines YOLOv7 for image recognition and pyAudioAnalysis for audio analysis to identify guns visually and discern gun-related sounds. The…
Building Secure Cloud Applications: A Developer’s Companion to NIST CSF
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) stands as a beacon of guidance for organizations navigating the intricate landscape of cybersecurity. In an era where cloud computing has become integral to software development, the fusion of…
Maven Dependency Scope Applied
To get started, we are going to take an example of a typical three-layer app to analyze the module boundaries and the challenges faced in managing them. This specific architecture has been intentionally chosen, assuming that it is familiar to…
Unraveling the Wonders of Bluetooth: Connecting the World Wirelessly
Few technologies have had as deep an influence as Bluetooth in a world where continuous connection has become a fundamental part of our everyday lives. Bluetooth has quietly revolutionized the way we connect and interact wirelessly, from our headphones to…
Building Decentralized Applications With Node.js and Web 3.0
This new era is characterized by the rise of decentralized applications (DApps), which operate on blockchain technology, offering enhanced security, transparency, and user sovereignty. As a full-stack developer, understanding how to build DApps using popular tools like Node.js is not…
Private Cloud’s Deployment
Public clouds are designed for everyone but there are a lot of customers that need a private version of the cloud. Sometimes, they need physically isolated data centers and networks located in their own country. These private clouds offer Platform-as-a-Service…
The Need for Secure Cloud Development Environments
The use of Cloud Development Environments (CDEs) allows the migration of coding environments online. Solutions range from using a self-hosted platform or a hosted service. In particular, the advantage of using CDEs with data security, i.e., secure Cloud Development Environments,…
Protecting Your Digital Realm: Understanding Cybersecurity Threats and Defenses
Cybersecurity has become a paramount concern for individuals and organizations alike. As technology advances, the techniques employed by cybercriminals also grow more sophisticated. Understanding the different types of cyber attacks and implementing robust security measures is crucial in safeguarding sensitive…
Database Security: Best Practices and What You Need to Know
In today’s rapidly evolving digital landscape, marked by the ascendancy of Artificial Intelligence (AI) and the ubiquity of cloud computing, the importance of database security has never been more pronounced. As databases increasingly become the backbone of AI algorithms and…
Threat Modeling
In an era where digital threats are constantly evolving, understanding and mitigating these risks is crucial for organizations of all sizes. Threat modeling emerges as a pivotal process in this landscape, offering a structured approach to identify, assess, and address…
Using Pen Tests to Protect Your Company From Digital Threats
Data breaches, system failures, bugs, and website defacement can seriously harm a company’s reputation and profits. Typically, companies realize the importance of auditing their infrastructure, evaluating established interaction patterns, and assessing the business logic of their services only after developing…
How to Build a Data Foundation for Generative AI
Since late 2022, generative AI has quickly demonstrated its value and potential to help businesses of all sizes innovate faster. By generating new media from prompts, generative AI stands to become a powerful productivity aid, multiplying the effect of creative…
Securing Digital Frontiers: The Essential Role of Network Access Control in Modern Cybersecurity
In the ever-evolving landscape of cybersecurity, Network Access Control (NAC) stands out as a critical technology and process for authenticating and authorizing users on a private or corporate network. NAC not only restricts unauthorized access but aligns closely with the…
Securing Applications in ROKS Cluster
In the dynamic landscape of cloud computing, ensuring the security of your applications is paramount. This is particularly true when dealing with a Red Hat OpenShift Kubernetes Service (ROKS) cluster, where applications may be exposed to the public internet. In…
Protecting Privacy in the Age of Edge AI: The Role of Homomorphic Encryption
The Urgency of Data Privacy in a Connected World Recent years have witnessed a mounting concern about data privacy, and these concerns are not unfounded. In a world where connectivity is ubiquitous, the statistics paint a compelling picture. According to…
What Do You Need to Know About DevOps Lifecycle Phases?
With technology always changing, the DevOps lifecycle has become a popular development disruptor. However, talking about how the lifecycle has transformed due to digitalization is also essential. Today, this blog investigates the significance of DevOps, its phases, potential future, and…
Revolutionizing Kubernetes With K8sGPT: A Deep Dive Into AI-Driven Insights
In the ever-evolving landscape of Kubernetes (K8s), the introduction of AI-driven technologies continues to reshape the way we manage and optimize containerized applications. K8sGPT, a cutting-edge platform powered by artificial intelligence, takes center stage in this transformation. This article explores…
Unleashing the Power of OAuth Authentication in Computing
Authentication is critical to the security of computing systems, applications, and data. OAuth, a free and open protocol, has emerged as a popular alternative for secure authorization and authentication. We go deep into the realm of OAuth authentication in computing…
Significance of CMDB in Device Visibility To Control Unauthorized Access in Banks
Unauthorized access in an organization refers to the act of accessing or attempting to access a system, network, or resource without proper authorization or permission. This can include accessing confidential information, manipulating data, or using the system or network for…
The Role of Zero-Knowledge Proofs in LLM Chains for Data Privacy
In today’s digital age, data privacy has become a paramount concern for individuals and organizations alike. With the increasing amount of personal and sensitive information being stored and transmitted online, there is a growing need for robust security measures to…
How To Ensure Cloud Application Security: Compromises and Best Practices
Local storage has seen a notable reduction in demand over the past few years. With inexpensive internet packages, users can explore the cloud-enabled infrastructure to stream all their files. As the demand for cloud-based apps surged, more entrepreneurs switched to…
Mastering Docker Networking Drivers: Optimizing Container Communication
Docker has transformed the world of containerization by providing a powerful platform for packaging, shipping, and running applications within containers. A key aspect of containerization is networking, and Docker offers a range of networking drivers to facilitate communication between containers…
Secure Your Secrets With .env
Using environment variables to store secrets instead of writing them directly into your code is one of the quickest and easiest ways to add a layer of protection to your projects. There are many ways to use them, but a…
Rethinking Threat Detection and Response in Cloud-Native Ecosystems
In highly dynamic cloud-native environments, the traditional Threat Detection and Response (TDR) approaches are increasingly showing their limitations. With its unique architecture and operational dynamics, Kubernetes demands re-evaluating how we handle security threats, particularly in the context of Endpoint Detection &…
Simplifying Kubernetes Deployments: An In-Depth Look at Helm
Kubernetes has significantly simplified the management and operation of containerized applications. However, as these applications grow in complexity, there is an increasing need for more sophisticated deployment management tools. This is where Helm becomes invaluable. As a Kubernetes package manager,…
Revolutionizing Commerce With AI: Trends and Predictions
Picture a future where commerce is not just an exchange of goods and services but an intricate relationship of data, insights, and artificial intelligence (AI). This is the new reality for product leaders in the digital age, where AI is…
Honeytokens for Peace of Mind: Using Cyber Deception To Buy Time to Remediate at Scale
No matter what part of the organization you work in, there is one thing everyone wants: a good night’s sleep. Everybody, from operations to security to development, wants peace of mind that all the doors are locked, all the networks…
What Is Compliance Monitoring for Remote Developers?
Compliance monitoring involves tracking remote employee activities to ensure they follow the rules and regulations set forth by companies and the industry. While most developers remain productive and conscientious in a work-from-home role, a few might abuse the privilege and…
Fueling the Future: How Tech Funding Empowers IT Consultants in AI/ML and Cybersecurity
The IT landscape is undergoing a seismic shift, propelled by the twin engines of artificial intelligence (AI) and machine learning (ML) on one hand, and the ever-evolving threat landscape in cybersecurity and data breaches threat on the other. This digital…
Setting Up a Docker Swarm Cluster and Deploying Containers: A Comprehensive Guide
Docker Swarm is a powerful orchestration tool that allows you to manage and deploy containers in a cluster environment. It provides features for load balancing, scaling, and ensuring high availability of your containerized applications. In this comprehensive tutorial, we will…
Guarding the Digital Fortress: A Comprehensive Guide to Intrusion Detection and Prevention Systems
The need for comprehensive cybersecurity has never been higher in our linked world, where data travels freely and systems are more entangled than ever before. Threats emerge in tandem with the digital ecosystem. Intrusion Detection and Prevention Systems (IDPS) are…
Why Companies Are Moving Back to On-Premise From the Cloud
The past few years have made cloud computing an undisputed king of IT infrastructure in business. Companies flocked to the cloud for cost-efficiency, scalability, and flexibility. The online survey portals show that the cloud adoption rate among enterprise organizations is…
Strengthening Cybersecurity: The Role of Digital Certificates and PKI in Authentication
Data protection remains integral in our wide digital world. Amid serious cyber threats, a strong cybersecurity plan needs to be formulated, and at the epicenter of it lies a silent guardian: authentication. The global public key infrastructure (PKI) market is…
Unraveling CAPTCHA: A Comprehensive Insight Into Its History, Applications, and Efficiency
CAPTCHA, which stands for “Completely Automated Public Turing Test to Tell Computers and Humans Apart,” is a well-known security measure used to identify between bots and real users on the internet. Let’s look at its origins, evolution, applications, and limits.…
Unlocking the Secrets of Data Privacy: Navigating the World of Data Anonymization: Part 2
In the first part of this series, we discussed the importance, ethical considerations, and challenges of data anonymization. Now, let’s dive into various data anonymization techniques, their strengths, weaknesses, and their implementation in Python. 1. Data Masking Data masking, or obfuscation involves hiding…
Adding OpenSSL Generated Certificates to Your Server: A Comprehensive Guide
In the current digital environment, where cyber threats are constantly changing, protecting your server is essential. Utilizing SSL/TLS certificates to encrypt data transferred between your server and clients is one of the fundamental components of server security. To create these…
The Essential Guide To Effective Software Testing
Imagine that your organization has been exhaustively focused on developing a software product and is now eagerly anticipating the release of that product. However, as the launch day arrives, the reality of the product reveal is a disappointment because the…
AI Helps With the Implementation of Simulated Cyber Defense Techniques
Advances in AI technology are playing a crucial role in the evolution of the cybersecurity sector. Markets and Markets reports that global companies will spend over $60 billion on AI-driven cybersecurity solutions in 2028. Some of the benefits of AI…
Why We Need Cybersecurity Whistleblowers
The term “whistleblower” can carry wildly different connotations depending on who you’re talking to. While some see the practice as noble, others may associate it with disgruntled employees seeking revenge on their employers. Despite the potential controversy, whistleblowers are an…
Fast, Secure, and Highly Available Real-Time Data Warehousing Based on Apache Doris
This is a whole-journey guide for Apache Doris users, especially those from the financial sector, which requires a high level of data security and availability. If you don’t know how to build a real-time data pipeline and make the most…
Jakarta EE Security: Using Identity Stores
As one of the most important aspects of modern business applications and services, the security of the Java enterprise-grade applications didn’t wait for the Jakarta EE 10 outbreak. Starting from the first releases of J2EE in early Y2K, security was…
Encrypting Data Using Asymmetric Encryption: A Comprehensive Guide
Asymmetric encryption, commonly known as public-key encryption, is an important technique for safeguarding data transport and storage. It uses a pair of keys for encryption and decryption: a public key for encryption and a private key for decryption. Let’s look…
7 Tips for Effective Cybersecurity Training for Developers
Cybersecurity is an ever-present concern for organizations across all industries. Threat actors continually seek ways to infiltrate businesses and sell stolen data to the highest bidder. Using updated and relevant security knowledge, your software developers can be the first line…
The Exploration of Static vs Dynamic Code Analysis
In the realm of software development, ensuring the reliability, security, and efficiency of code is paramount. Two essential methodologies employed for this purpose are Static Code Analysis (SCA) and Dynamic Code Analysis (DCA). These approaches represent distinct strategies, each with…
7 Considerations for Multi-Cluster Kubernetes
In the IT space today, customers often intermix Multi-Cloud and hybrid-cloud terms without necessarily understanding the distinction between them. Understanding Hybrid and Multi-Cloud Environments A hybrid cloud is a cloud computing environment that combines public and private (typically on-premise) clouds, allowing…
Securing Infinispan With Keycloak
Infinispan and Keycloak in a Nutshell About Infinispan Infinispan is an open-source, in-memory distributed key/value data store. It is designed to provide fast and scalable access to frequently accessed data by storing it in memory. In addition to caching, Infinispan…
GCP to AWS Migration: A Comprehensive Guide
Migrating from one cloud platform to another can be a transformative decision for your business. As technology continues to evolve, businesses often find themselves evaluating their cloud service providers to ensure they are getting the best value, features, and performance. …
A Comprehensive Guide to Cloud-Init: Automating Cloud Instance Initialization
Automation reigns supreme in the world of cloud computing. It enables businesses to manage and deploy cloud instances efficiently, saving time and lowering the possibility of human error. The program “cloud-init” is among the most important resources for automating instance…
Demystifying Cloud Trends: Statistics and Strategies for Robust Security
According to Gartner research, the Global Public Cloud Services spending is estimated to Total $679 Billion in 2024 from $491 Billion in 2022. The adoption is estimated to surpass $1 Trillion by 2027. An interesting aspect in O’Reilly’s latest Cloud…
The Technology Powering Trading Signals in Binary Options: A Deep Dive
Binary options trading, a form of financial trading where the payout is either a fixed amount or nothing at all, has seen significant growth in popularity. Central to this growth is the development and use of sophisticated trading signals. These…
The Ultimate Guide To Securing Virtual Machines
Virtual machines (VMs) have become an essential component of many sectors in the digital era, providing flexibility, scalability, and cost-efficiency. The security of these virtualized environments, on the other hand, is critical. This article will guide you through the necessary…
12 Software Development Predictions for a Futuristic World
Predicting the future of software development trends is always a tough call. Why? Because emerging trends and frequent changes in the software development domain have always been expected to satisfy the market’s rising expectations. Such trends will also rule the…
Infinispan Insights: Security Basics and Secured Caches
Security in a Nutshell When we talk about security, there are two main things to consider: proving who you are (authentication) and deciding what you’re allowed to do (authorization). These tasks are managed by one or more security realms. Authentication…
Explore Redis for User Session Management on AWS Elasticache
In the bustling digital marketplace, web applications are like vibrant cities, constantly humming with activity as users come and go. Just as cities use various systems to keep track of their inhabitants and visitors, web applications rely on user session…
What Is OAuth 2.0?
OAuth 2.0 is an authorization framework that enables users to safely share their data between different applications. It is an industry standard that addresses the API security concerns associated with sharing user credentials while providing simple, well-defined authorization flows for…
AI and Cybersecurity in 2024: What’s Changing and Why It Matters
As 2024 unfolds, the cybersecurity landscape is witnessing a notable transformation, primarily driven by the increasing integration of artificial intelligence (AI). Here’s a deeper dive into what these changes entail and their significance in the cyber world. The New Regulatory…
IoT Security in the Age of Cyber Threats
The Internet of Things stands as one of the most significant technological advancements of our time. These vast neural networks enable IoT devices to seamlessly connect the mundane and the sophisticated into the digital fabric of the internet. This range…
How To Use AzureSignTool to Sign Executables With Azure DevOps
AzureSignTool is a code-signing utility that organizations use to secure their software. This signing tool is compatible with all major executable files and works impeccably with all OV and EV code signing certificates. But, it’s mostly used with Azure DevOps…
Create a Registration API in 15 minutes
Allowing users to register in your app is one of those important things few know how to implement correctly. It requires knowledge about a whole range of complex things, that few software developers have time to study. In the video…
Unveiling the Power of NFC Technology: Transforming Connectivity in the Digital Era
In today’s fast-paced world, technology has become an integral part of our lives. Among the many innovations that have emerged, Near Field Communication (NFC) stands out as a game-changer. This revolutionary wireless communication technology offers a range of possibilities that…
Zero Trust in API Management
In our digital age, the role of APIs (Application Programming Interfaces) in business is more crucial than ever. These APIs allow companies to be innovative, grow quickly, and adapt their services. But, as much as APIs are vital, they also…
Hacking Protected Java-Based Programs
This article provides examples of hacking techniques that can help Java developers avoid vulnerabilities in their programs. It is not intended to train hackers but rather for naive developers who think that standard obfuscators will save them from their intellectual property…
Exploring the Security Risks of Large Language Models
According to a recent survey, 74% of IT decision-makers have expressed concerns about the cybersecurity risks associated with LLMs, such as the potential for spreading misinformation. The world of Artificial Intelligence (AI) is booming with new capabilities, mainly owing to…
Identity as a Service (IDaaS): The Future of Secure and Convenient Authentication
Managing identities and making sure that users can access various online services and platforms securely have become of utmost importance in our increasingly digital and interconnected world. Passwords and PINs, which are common forms of authentication, have been shown to…
Unlocking the Secrets of Data Privacy: Navigating the World of Data Anonymization, Part 1
In today’s data-driven world, ensuring individual data privacy has become critical as organizations rely on extensive data for decision-making, research, and customer engagement. Data anonymization is a technique that transforms personal data to safeguard personal information while maintaining its utility.…
Key Aspects of API Evolution: Version Control in Multi-Environments With API7 Enterprise
In the rapidly evolving landscape of software systems in today’s digital era, API version control has emerged as a critical strategy to ensure the robust evolution of systems. Particularly in multi-environment scenarios, effective management and tracking of API changes become…
How To Use Artificial Intelligence to Optimize DevOps
DevOps and AI make an inseparable pair and impact businesses of all kinds. While DevOps enables speedy product development and easier maintenance of existing deployments, AI transforms the overall system functionality. The DevOps team can rely on artificial intelligence and…
Unveiling the Power of Helidon 4: A Dive Into New Features
In the ever-evolving landscape of microservices development, Helidon has emerged as a beacon of innovation. The release of Helidon 4 brings forth a wave of enhancements and features that promise to redefine the way developers approach microservices architecture. In this…
The New Frontier in Cybersecurity: Embracing Security as Code
How We Used to Handle Security A few years ago, I was working on a completely new project for a Fortune 500 corporation, trying to bring a brand new cloud-based web service to life simultaneously in 4 different countries in…
Microservices Resilient Testing Framework
Resilience refers to the ability to withstand, recover from, or adapt to challenges, changes, or disruptions. As organizations increasingly embrace the microservices approach, the need for a resilient testing framework becomes important for the reliability, scalability, and security of these…
Secure Password Hashing in Java: Best Practices and Code Examples
In the domain of digital security, password hashing stands as a critical line of defense against unauthorized access. However, the landscape of hashing algorithms has evolved significantly, with some methods becoming obsolete and newer, more secure techniques emerging. This article…
Are the Fears About the EU Cyber Resilience Act Justified?
On Wednesday, July 19, the European Parliament voted in favor of a major new legal framework regarding cybersecurity: the Cyber Resilience Act (CRA). According to the press release following the vote: This article has been indexed from DZone Security Zone…
Anticipating the Journey: Launching Your First Open Source Project
I’ve been deeply immersed in the world of developer products for the past decade, and let me tell you, I’ve been quite an open-source enthusiast. Over the years, I’ve had the pleasure (and occasional pain) of shepherding open-source projects of…
Matching Algorithms in Dating Apps
Modern dating apps have long been a familiar part of our daily lives. Ten years ago, Tinder, Mamba, Pure, and others turned traditional ideas about dating and relationships upside down. Whether we like it or not, dating apps have started…
The Elusive Quest for DevSecOps Collaboration
Despite years of discussing DevSecOps, achieving security and development collaboration remains an uphill battle in most organizations. This article explores why real-world DevSecOps adoption lags behind expectations, common barriers faced, and how the Stream Security platform bridges visibility and policy…
Automate Your SSO With Ansible and Keycloak
The article Deploy Keycloak single sign-on with Ansible discussed how to automate the deployment of Keycloak. In this follow-up article, we’ll use that as a baseline and explore how to automate the configuration of the Keycloak single sign-on (SSO) server,…
With the Right Support, Developers Can Lead Your Organization to Superior PCI-DSS 4.0 Compliance
The Payment Card Industry Data Security Standard (PCI-DSS) version 4.0 will change almost everything about security for any business or organization that accepts electronic payments, which is a vast majority of them. And make no mistake, this update will be…