Tag: DZone Security Zone

Azure Data Box

Azure Data Box is a product offered by Microsoft Azure that helps organizations transfer large amounts of data securely and efficiently to and from Azure. It is similar to AWS Snowball Edge or/ Google Transfer Appliance. The purpose of the Azure…

Build a Web3 Ticketing System and Disrupt Online Ticketing

A popular and practical use case for web3 is generating tickets to live events. Blockchains such as Ethereum can guarantee the ownership, originator, and authenticity of a digital item, effectively solving the problem of counterfeit tickets. While major players such…

10 Best Practices for Using Kubernetes Network Policies

As more applications are deployed in Kubernetes clusters, ensuring that traffic flows securely and efficiently between them becomes increasingly important. Kubernetes Network Policies are a powerful tool for controlling traffic flow at the IP address or port level, but implementing…

Zero Trust Network for Microservices With Istio

Security was mostly perimeter-based while building monolithic applications. It means securing the network perimeter and access control using firewalls. With the advent of microservices architecture, static and network-based perimeters are no longer effective. Nowadays, applications are deployed and managed by…

How to Handle Secrets in Jenkins

Jenkins is a popular open-source automation server that is widely used for building, testing, and deploying software. It allows developers to automate many aspects of their software development process, including continuous integration and continuous deployment. As with any continuous integration…

Data Encryption: Benefits, Types, and Methods

Data encryption is one of the most prevalent digital safety measures since it safeguards information and reduces the impact of cyber threats. Modern organizations incorporate encryption in various daily activities, such as communication and payments. That said, it is essential…

Tornado vs. FastAPI: Why We Made the Switch

As developers, we are always on the lookout for tools and technologies that can improve our products and services. In this article, we will discuss the key differences between Tornado and FastAPI, two popular web frameworks for Python. Additionally, we…

Breaking the Wall Between Dev, Sec, and Ops

DevSecOps, in layman’s language, is a combined form of software development, security, and software operations. According to Gartner’s research, “It is estimated that at least 95% of cloud security failures through 2022 will be the fault of the enterprise”. Therefore,…

OpenShift vs. Kubernetes: The Unfair Battle

The most popular container orchestration software alternatives available today are OpenShift and Kubernetes.  In this article, we are going to be comparing OpenShift and Kubernetes, and let me tell you, the comparison is far from fair. Indeed, comparing OpenShift and Kubernetes…

From Zero to Hero: Learning Web3 With Infura and Python

Web3, blockchain technology, and cryptocurrency are all fascinating topics. The technology, applications, ecosystem, and the impact on society are all moving at incredible speeds. In this article, we will talk about learning web3 development from the point of view of…

Shadow and Zombie APIs: How to Minimize Vulnerabilities

Application Programming Interfaces (APIs) are the backbone of modern software development and are now vital strategic assets for large enterprises. However, with increasing API proliferation and subsequent sprawl, APIs can also pose significant security risks for enterprises. Shadow or zombie…

5 DNS Troubleshooting Tips for Network Teams

“Set it and forget it” is the approach that most network teams follow with their authoritative Domain Name System (DNS). If the system is working and end-users find network connections to revenue-generating applications, services, and content, then administrators will generally…

HIPAA Compliance Testing in Software Applications

Health Insurance Portability and Accountability Act (HIPAA) regulations must be followed by any software used in the healthcare industry that manages electronic patient health information (ePHI). Federal law outlines requirements to guarantee that private patient health information is not disclosed…

GitHub Exposed a Private SSH Key: What You Need to Know

Secrets leakage is a growing problem affecting companies of all sizes, including GitHub. They recently made an announcement on their blog regarding an SSH private key exposure: [Last week, GitHub] discovered that GitHub.com’s RSA SSH private key was briefly exposed…

How To Build on Linea: A ZK-rollup on Ethereum

There are many new L2s emerging in the web3 ecosystem with the goal of improving Ethereum’s scalability. These L2s use a variety of solutions to create layers on top of Ethereum that are faster, cheaper, and yet still benefit from…

Improve AWS Security and Compliance With CDK-nag?

AWS Cloud Development Kit (AWS CDK) is a powerful tool that allows developers to define cloud infrastructure in code using familiar programming languages like TypeScript, Python, and Java. However, as with any infrastructure-as-code tool, it’s important to ensure that the…

How To Build for Payment Processing Resiliency

If you’re developing applications for a business, then one of your most important tasks is collecting payment for goods or services. Sure, providing those goods or services is essential to keeping customers happy. But if you don’t collect payments, your…

Container Security: Top 5 Best Practices for DevOps Engineers

Containerization has resulted in many businesses and organizations developing and deploying applications differently. A recent report by Gartner indicated that by 2022, more than 75% of global organizations would be running containerized applications in production, up from less than 30%…

Attaining Document Security in FileNet Content Management System

FileNet is a document management system developed by IBM that allows organizations to manage and store their digital content. Document Security is an essential aspect of any document management system, including FileNet.  Important Considerations for FileNet Security 1. Authentication: FileNet provides…

Choosing the Right IAM Solution

Identity and Access Management (IAM) is one of the critical components of any commercial software. As the name suggests, IAM solutions cover the identity of the users, their roles, privileges, authentication, and authorization. Long story short, IAM is based on…

Is TestOps the Future of Software Testing?

TestOps is an emerging approach to software testing that combines the principles of DevOps with testing practices. TestOps aims to improve the efficiency and effectiveness of testing by incorporating it earlier in the software development lifecycle and automating as much…

How to Use HashiCorp Boundary for Secured Remote Access

As companies rely increasingly on multiple applications residing in different regions and networks, security has become a critical concern. The process of accessing these applications can be complex and challenging, particularly when they are running in different data centers and…

Dependency Poker for Scrum Teams

Dependency Poker is an Agile game — similar to planning poker — that enables teams to identify and manage dependencies in the development process. It can be utilized in Backlog Refinement or SAFe’s PI Planning to enhance collaboration and reduce project risks.  The…

Redefining the Boundaries of People, Process, and Platforms

Day two of Dynatrace Perform began with a great discussion between Kelsey Hightower, Distinguished Developer Advocate at Google Cloud Platform and Andi Grabner, DevOps Evangelist at Dynatrace. The theme of their discussion was redefining the boundaries of people, processes and…

Introduction to Shift Left Testing

Shift-left testing is a software testing approach where testing is moved to an earlier phase in the development process, closer to the development phase. The goal of shift-left testing is to catch and fix defects as early as possible in the…

Using Artificial Intelligence in Finance

It is believed that no other technology has had a greater impact on the world in the last ten years than AI. Artificial intelligence, which gives robots the ability to learn based solely on data, is being incorporated into almost…

Introduction To OpenSSH

OpenSSH is a free and open-source suite of secure networking utilities that has become a critical tool for system administrators and developers who need to securely manage and access remote systems over unsecured networks. In this article, we will take…

Scaling Your Testing Efforts With Cloud-Based Testing Tools

As software applications grow more complex, the importance of testing increases. Testing helps ensure that software meets the required standards and functions as expected. However, testing can be a time-consuming and resource-intensive process, particularly when it comes to scaling efforts…

Host Hack Attempt Detection Using ELK

What Is SIEM? SIEM stands for Security Information and Event Management. It is a software solution that provides real-time analysis of security alerts generated by network hardware and applications. SIEM collects log data from multiple sources such as network devices,…

4 Best dApp Frameworks for First-Time Ethereum Developers

Ethereum has experienced dazzling growth in recent years. According to YCharts, the programmable blockchain now has approximately 220 million unique addresses. Linked to the increase in users is an explosion in the number of dApps. Global companies and startups across…

Stop Using Spring Profiles Per Environment

Lately, I’ve come across a lot of discussions and articles about Spring’s feature called Profiles that are promoting them as a way to separate environment-specific configurations, which I consider a bad practice. Common Examples The typical way profiles are presented…

mTLS Everywere

Security in one’s information system has always been among the most critical non-functional requirements. Transport Layer Security, aka TLS and formerly SSL, is among its many pillars. In this post, I’ll show how to configure TLS for the Apache APISIX…

What Are the Different Types of API Testing?

Users expect to be able to use apps across devices and browsers. As a result, you must conduct thorough different API testing types to understand how well it works and whether it can perform its primary functions. Some testers need…

What Is Pen Testing?

Penetration testing, also known as pen testing, is the process of testing a computer system, network, or web application to find vulnerabilities and weaknesses that hackers can exploit. The goal of a penetration test is to identify and report vulnerabilities…

Cachet 2.4: Code Execution via Laravel Configuration Injection

Status pages are now an essential service offered by all Software-as-a-Service companies. To help their adoption, startups quickly conceived status pages as-a-service, and open-source self-hosted alternatives were made available. Cachet, also sometimes referred to as CachetHQ, is a broadly adopted…

Solving the Kubernetes Security Puzzle

The benefits of adopting cloud-native practices have been talked about by industry professionals ad nauseam, with everyone extolling its ability to lower costs, easily scale, and fuel innovation like never before. Easier said than done. This article has been indexed…

19 Most Common OpenSSL Commands for 2023

What Is OpenSSL Command? OpenSSL is an open-source-based implementation of the SSL protocol, with versions available for Windows, Linux, and Mac OS X. It is a highly versatile tool used to create CSRs (Certificate Signing Requests) and Private Keys as…

A Guide to Understanding XDR Security Systems

XDR is a security system that has been designed to collect, correlate and contextualize alerts from a range of different solutions across servers, applications, networks, endpoints, cloud workloads, and other areas. It incorporates SaaS-based, cloud-native technology. What Is XDR?  XDR…

Getting a Private SSL Certificate Free of Cost

You work for any software deployment project, you deploy code in multiple environments and test it.  You test the site with HTTP, not HTTPS. Why? you need an SSL certificate for it. Getting a certificate for a lower environment could…

AWS IP Address Management

In a recent project, I worked with a client who was managing over 100 accounts and recently adopted AWS Control Tower. Despite this, I noticed that the management of CIDR ranges was still a manual process and all IP ranges…

Container Security: Don’t Let Your Guard Down

Developers and DevOps teams have embraced the use of containers for application development and deployment. They offer a lightweight and scalable solution to package software applications. The popularity of containerization is due to its apparent benefits, but it has also…

How To Use Artificial Intelligence to Ensure Better Security

The advancement in disruptive technologies has given rise to a plethora of opportunities for miscreants to fuel cyber sabotage and data integrity risk. The proliferation of cloud-based technologies has accelerated the process of data exchange and sharing—data is more easily…

A Complete Guide on ERR_SSL_PROTOCOL_ERROR

What Does ERR_SSL_PROTOCOL_ERROR Mean? ERR_SSL_PROTOCOL_ERROR is an error message that Chrome shows when a website has a problem with the SSL/TLS certificate. SSL/TLS is the protocol that encrypts data between your browser and the web server, and it’s essential for…

DevSecOps: The Future of Secure Software Development

As a software developer with over a decade of experience, I’ve witnessed firsthand the evolution of software development practices. One such practice that has gained significant traction in recent years is DevSecOps. In my opinion, DevSecOps is a necessary evolution…

How to Engineer Your Technical Debt Response

The Southwest Airlines fiasco from December 2022 and the FAA Notam database fiasco from January 2023 had one thing in common: their respective root causes were mired in technical debt. At its most basic, technical debt represents some kind of…

Using Blockchain Tech to Optimize the Supply Chain

The blockchain space has gained considerable momentum over the past few years. Cryptocurrency remains this technology’s most widely recognized use case, but new applications and benefits emerge as it grows. For example, supply chain optimization is one less glamorous but…

Untold Benefits of Application Modernization

Application modernization has become a hot topic in recent years as organizations strive to improve their systems and stay ahead of the competition. From improved user experience to reduced costs and increased efficiency, there are many reasons companies consider modernizing…

Supply Chain Security: What Is SLSA? Part I

Quick Introduction to the Software Supply Chain Recently, “software supply chain attack” has been breaking all the news headlines. One infamous example is the SolarWinds attack or the 2020 United States federal government data breach. In fact, according to a…

Authenticate With OpenID Connect and Apache APISIX

Lots of companies are eager to provide their identity provider: Twitter, Facebook, Google, etc. For smaller businesses, not having to manage identities is a benefit. However, we want to avoid being locked into one provider. In this post, I want…

AWS Multi-Account Strategy and Landing Zone

AWS multi-account strategy is a powerful method of managing multiple AWS accounts within an organization. It is designed to help organizations scale and manage their cloud infrastructure more effectively while maintaining security and compliance. In this article, we will explore…

Can I Code Without My Laptop

Learning Adaptability A few weeks ago, my laptop crashed during a meeting. It was painful as I was about to start on an exciting new feature that my Product Owner (PO) had just proposed. I immediately rushed to the IT…

Dependency Injection and Ways to Inject It Using .NET Core API

In this article, we are going to discuss dependency injection and its usage and benefits. We will also discuss different ways to implement dependency injection. Prerequisites Basic understanding of the C# programming language. Understanding of Object-Oriented programming. Basic understanding of…

OWASP Kubernetes Top 10

One of the biggest concerns when using Kubernetes is whether we are complying with the security posture and taking into account all possible threats. For this reason, OWASP has created the OWASP Kubernetes Top 10, which helps identify the most…

Secure APIs: Best Practices and Measures

An API (Application Programming Interface) acts as an intermediary between two distinct software applications, enabling seamless communication and data exchange. By providing a standardized interface, APIs offer developers the ability to access specific functionalities or data from another software application…

Product Security (DevSecOps Practices)

What Is Product Security? Product Security is a process within the Cybersecurity function which aims to deliver a secure product, which includes the organization’s Web applications, Web services, Mobile applications, or any hardware manufactured. This focuses on considering security at…

Understanding and Resolving a Common Error

If you have ever encountered the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error, you may have been puzzled by what it means and how to fix it. In this post, we will explain what causes this error and provide some tips on how to resolve…