Category: DZone Security Zone

Understanding PDF Standards: What Developers Should Know

Portable Document Format (PDF) is a universal document-sharing and collaboration medium. From e-books to legal documents, PDFs are widely used in various business, educational, and governmental sectors. The acronym “PDF” encompasses several distinct standards, each designed for specific requirements and…

Data Governance Best Practices

In the digital age, data governance isn’t a luxury; it’s a necessity. From multinationals to fledgling startups, organizations are becoming increasingly data-centric. The myriad technologies at our disposal — SQL databases, NoSQL systems, REST APIs, GraphQL, and more — offer…

How To Fix SignTool Error

Are you running into this error message but can’t seem to get past it to digitally sign your code using a code-signing certificate? We’ll walk you through the troubleshooting solutions that’ll fix the Signtool ‘no certificates were found’ error in…

Infection Method: Domain Takeover

A domain takeover is a cyberattack when an attacker gains control of a domain name owned by another person or organization. This can have severe consequences as the attacker can use the domain for malicious purposes, such as spreading malware,…

Spring OAuth Server: Default Configuration

Spring has come out with an OAuth2 solution, and in this article, we will look at the default configuration that comes bundled with the spring-oauth server. Details about how OAuth2.0 works are out of the scope of this article and…

Advancing IoT Security: IoT Security Analytics Tools

The advent of the Internet of Things (IoT) has ushered in a new era of connectivity, revolutionizing various sectors, including homes, industries, and urban areas. However, this widespread connectivity also brings about significant security challenges, necessitating robust threat detection and…

IoT Security: Strategies, Challenges, and Essential Tools

The Internet of Things (IoT) has ushered in a new era of connectivity, transforming the way we live, work, and interact with our surroundings. It encompasses a vast network of devices, ranging from everyday appliances to industrial machinery, all connected…

Data Privacy and Its Impact on Management

In the modern digital epoch, the importance of data management can hardly be overstated. Data is no longer just an operational byproduct but the lifeblood of organizations, fueling everything from strategic decisions to customer interactions. However, in this race for…

How to Design and Implement Automated Security Workflows

Automated security workflows are transformative in today’s digital era. They streamline and enhance how one safeguards systems, using automation to manage manual tasks. With cyber threats on the rise, embracing modern security practices becomes vital. By adopting these innovative methods,…

Implementing a Comprehensive ERP System Using SAFe®

The modern business landscape, resplendent in its technological evolution, underscores the indispensable role of Enterprise Resource Planning (ERP) systems. These systems, though monumental in their operational scope, offer the allure of a streamlined organization. However, the journey to a successful…

Yes, GitHub’s Copilot Can Leak (Real) Secrets

There has been a growing focus on the ethical and privacy concerns surrounding advanced language models like ChatGPT and OpenAI GPT technology. These concerns have raised important questions about the potential risks of using such models. However, it is not…

How To Implement OAuth User Authentication in Next.js

In this article, we will learn how to add user authentication with OAuth providers in your Next.js app. To do so, we’ll be using NextAuth.js, which is a user authentication solution that simplifies the whole process and has built-in support…

Security Vulnerabilities in CasaOS

As part of our continuous effort to improve our Clean Code technology and the security of the open-source ecosystem, our R&D team is always on the lookout for new 0-day security vulnerabilities in prominent software. We recently uncovered two critical…

The Journey of Becoming a Blockchain Developer

Blockchain solutions are becoming more popular, signaling a rising demand for professionals who develop these systems. Just six to eight years ago, the role of a blockchain developer was relatively obscure. Today, you can find these professionals networking in dedicated…

Secure Your Web Applications With Facial Authentication

For the last three decades, web technology has remained relevant due to its versatile nature and wide range of applications in building solutions. The web runs virtually everything, from simple blog sites to complex and scalable web-based ERP systems in…

Practical Routes to Healthy Culture

The recent release of the Accelerate State of DevOps Report has once again highlighted the value of organizational culture. If you create a generative culture with high trust and low blame, you’ll receive a 30% boost to your organization’s performance.…

18 Software Development Trends and Predictions 2024

The need for thorough risk assessments, continuous testing, and compliance checks before full-scale deployments is unavoidable. The future of software development demands businesses to be gearing up for a delicate dance between innovation and reliability. This year, we saw enthusiasm…

Secrets Management Takes More Than Just Tools

Every company wants to have a good security posture, and most are investing in security tooling. According to Gartner, worldwide spending on security is forecast to grow 11.3% in 2023 to reach more than $188.3 billion.  However, despite all this…

Authentication at the Network Edge

In order to protect themselves in a growing attack landscape, companies must employ defensive security techniques and evaluate if they’re doing enough to prevent bad actors from accessing their networks. In this post, we’ll discuss types of authentication that allow…

Why Granular, Scalable Control Is a Must for Every CTO

Robust and agile security frameworks are crucial for any organization. With the shift towards a microservices architecture, a more refined, granular level of access control becomes imperative due to the increased complexity, distribution, and autonomy associated with individual service operations.…

Should You Always Use a Service Mesh?

The service mesh has become popular lately, and many organizations seem to jump on the bandwagon. Promising enhanced observability, seamless microservice management, and impeccable communication, service mesh has become the talk of the town. But before you join the frenzy,…

How To Adopt Shift Left Security on the Cloud

In an era where cloud computing reigns supreme, the concept of security has undergone a profound transformation. As businesses rapidly migrate their operations and data to the cloud, the need to secure this digital frontier becomes increasingly paramount. Enter “Shift…

Unlocking a Passwordless Future: The Case for Passkeys

Passwords have long outlived their usefulness, yet they stubbornly persist as the default for authentication. 61% of consumers believe passwords are inherently insecure, while 47% find them inconvenient and frustrating. With password reuse rampant and phishing on the rise, individuals…

Understanding Zero Trust Security Building a Safer Digital World

In our rapidly evolving digital age where technology underpins almost every facet of our lives, cybersecurity has never been more critical. As the world becomes increasingly interconnected with personal devices and social networks to critical infrastructure and global business operations,…

Going Beyond MFA: How Okta is Redefining Enterprise Identity

At Oktane23, Okta revealed new solutions to automate identity governance, implement privileged access management, and enable continuous authentication and threat protection. Introduction Identity has historically been regarded as the gateway to grant or deny access to an enterprise’s digital resources…

The Rise of Superclouds: The Latest Trend in Cloud Computing

Since the pandemic hit the world two years ago, cloud adoption has exploded. The majority of customers use multi-clouds, which are isolated silos, and each public cloud has its own management tools, operating environment, and development environment. Companies keep investing…

Service Mesh and Management Practices in Microservices

In the dynamic world of microservices architecture, efficient service communication is the linchpin that keeps the system running smoothly. To maintain the reliability, security, and performance of your microservices, you need a well-structured service mesh. This dedicated infrastructure layer is designed…

Giving Power Back to Your Users With Flow’s Account Model

Many alternative blockchains that have emerged recently are classified as “EVM” chains, meaning they operate exactly like Ethereum but have a different execution layer. This helps the cross-compatibility of smart contracts across chains, but it doesn’t solve some of the…

Dual Pillars of Embedded Systems: Ensuring Safety and Security

In today’s interconnected digital age, embedded systems are ubiquitous, from household appliances to sophisticated industrial machines and medical devices. As these systems increasingly impact our daily lives and critical infrastructures, ensuring their safety and security has become paramount. In this…

Top CNAPP Tools in 2023

A Cloud-Native Application Protection Platform (CNAPP) represents a cutting-edge solution in cybersecurity. In a world where applications increasingly reside in cloud environments, CNAPP emerges as a vital guardian. It is a holistic, adaptable security framework tailored to safeguard cloud-native applications,…

Ransomware: An Existential Threat Demanding Urgent Action

Ransomware continues to pose a serious and growing threat to organizations of all sizes and across all industries. According to a new research report from Zerto and Enterprise Strategy Group (ESG), nearly two-thirds of IT and cybersecurity professionals view ransomware…

Building vs. Buying Software

Whether to build or buy software is a dilemma many organizations face. There’s almost always a commercially available tool or solution to address your needs. However, you must weigh up competing factors when deciding whether to buy or build to…

Leveraging AI To Augment Humans in Cybersecurity

As artificial intelligence continues its rapid adoption across industries, the cybersecurity sector is exploring how to leverage AI to enhance defenses against increasingly sophisticated threats.  At the recent Fal.Con23 user conference, a CrowdStrike Executive Panel outlined their vision for integrating…

CrowdStrike Outlines Its Vision for AI-Driven Security at Fal.Con 2023

CrowdStrike welcomed over 4,500 cybersecurity professionals to its annual Fal.Con23 user conference last week in Las Vegas. President Mike Sentonas delivered an inspirational keynote outlining CrowdStrike’s bold vision for leveraging artificial intelligence and cloud-native technology to make security teams significantly faster,…

Secure the Cluster

This is an article from DZone’s 2023 Kubernetes in the Enterprise Trend Report. For more: Read the Report Kubernetes security is essential in today’s digital landscape. With the increasing adoption of containerization and microservices, Kubernetes has become the go-to solution…

GitHub Compliance – All You Need To Know

What has been one of the most impressive and breakthrough developments of the 2000s in the IT world? No doubt, Git! This version control system was presented by Linus Torvalds in 2005. It became so popular due to a number…

Microservices Security With SPIFFE and SPIRE

Enterprises these days have microservices distributed across a variety of environments — on-prem, cloud, containers, VMs, and more. Applications/services in such a heterogeneous system typically communicate with each other for various purposes, like data sharing. This setup poses multiple security…

Top 5 Benefits of Data Lineage

The need for precise and reliable data has never been more critical. Data lineage, a concept gaining attention, is pivotal in ensuring data integrity from inception to consumption. This article explores the top five benefits of data lineage, shedding light…

A Technical Deep Dive on Meltdown and Does It Work?

Meltdown has definitely taken the internet by storm. The attack seems quite simple and elegant, yet the whitepaper leaves out critical details on the specific vulnerability. It relies mostly on a combination of cache timing side-channels and speculative execution that…

How To Learn Cyber Security Step-by-Step

Cybersecurity is a critical field in today’s digital age, and understanding how to learn cybersecurity step-by-step is essential for both individuals and businesses. The process of acquiring the necessary knowledge and skills to become a proficient cyber security expert From…

Enhanced Security for Your Secrets With AWS Secrets Manager

In the current digital era, handling sensitive data like passwords, API keys, and other credentials is vital to safeguarding an organization’s infrastructure. Outdated methods of storing and managing secrets, including hardcoding them in configuration files or employing version control systems,…

SAML SSO In Terms Of GitHub Security

Isn’t it magic when all your DevOps team, including new members, can access the company’s repository fast and securely by simply logging in once? It isn’t a dream! You can easily arrange it using SAML single sign-on (SSO).   What…

How Are Autonomous Vehicles Changing Microcontroller Use?

The microcontroller industry is growing rapidly as electronics manufacturing booms, and some subsectors are experiencing more dramatic changes than others. Microcontrollers for automotive applications are rising in demand and undergoing a considerable shift in what they must offer. The automotive…

Handling Secrets With AWS Secrets Manager

In my previous tutorials, we looked at Azure Key Vault and Google Secret Manager: How to Handle Secrets With Azure Key Vault: In this piece, we had a look at the Zero Trust security strategy, how to put it into…

Secure Code Review Best Practices

Code review is an important part of the development process that can help to identify issues with the quality of the software. Secure code reviews are a specific type of code review that specifically evaluates the security of the software’s…

Securing Your CI/CD: An OIDC Tutorial

Let’s start with a story: Have you heard the news about CircleCI’s breach? No, not the one where they accidentally leaked some customer credentials a few years back. This time, it’s a bit more serious. It seems that some unauthorized…

Zero Trust Architecture: Enterprise Infrastructure

Importance of Security in Financial Institutions Security in financial institutions is of paramount importance due to the highly sensitive nature of the data they handle. These institutions hold vast amounts of personal and financial information of their customers, making them…

Fencing in Distributed Systems: Twitter’s Approach

Fencing is a crucial technique used in distributed systems to protect shared resources and maintain system stability. It involves isolating problematic nodes or preventing them from accessing shared resources, ensuring data integrity and overall system reliability. In this article, we…