Tag: DZone Security Zone

Next-Gen Threat Hunting Techniques With SIEM-SOAR Integration

In the constantly shifting realm of cybersecurity, remaining ahead of emerging threats is no longer merely an aspiration but an imperative. With cyber adversaries continuously enhancing their skills and tenacity, businesses are progressively embracing cutting-edge technologies and inventive tactics to…

Why You Shouldn’t Test on Rooted Devices

“Mobile is becoming not only the new digital hub but also the bridge to the physical world.”– Thomas Husson, VP and Principal Analyst at Forrester Research Mobile devices have become an inevitable part of organizations’ strategies to do more with…

Securing Your Applications With Spring Security

In today’s increasingly digital world, securing your applications has become paramount. As developers, we must ensure that our applications are protected from unauthorized access and malicious attacks. One popular solution for securing Java applications is Spring Security, a comprehensive and…

What Is Privacy by Design?

Privacy by Design (PbD) is an approach to systems engineering that aims to embed privacy into every stage of the development process and across the entire organization from day one. Privacy is too often overlooked or solely an afterthought. Policies…

The Promise of Personal Data for Better Living

Emerging technologies are unlocking new possibilities for gathering and leveraging data from personal devices to provide highly customized and contextualized user experiences. As Dr. Poppy Crum, CTO, and neuroscientist, highlighted in her Technology and Human Evolution presentation at TIBCO Next,…

Gradle Version Catalogs on Android

Gradle version catalogs allow us to add and maintain dependencies in an easy and scalable way. Apps grow, and managing projects with several development teams increases the compilation time. One potential solution to address this issue involves segmenting the project…

Spring Authentication With MetaMask

When choosing a user authentication method for your application, you usually have several options: develop your own system for identification, authentication, and authorization, or use a ready-made solution. A ready-made solution means that the user already has an account on…

Why GraphQL API Security Is Unique

Enterprise security teams have had since 2015 to familiarize themselves with GraphQL API security. But many — if not most — still haven’t captured the security nuances of the popular open-source query language. Simply understanding GraphQL’s processes and vulnerable attack…

The Top Cybersecurity Risks in Agile Software Development

Agile software development has transformed how software is created and delivered. It fosters collaboration, flexibility, and quick development cycles, making it appealing to many teams. However, Agile’s numerous advantages come with specific cybersecurity risks that developers must address. In this…

Protect Your Keys: Lessons from the Azure Key Breach

On July 11, 2023, Microsoft released details of a coordinated attack from threat actors, identified as Storm-0558. This state-sponsored espionage group infiltrated email systems in an effort to collect information from targets such as the U.S. State and Commerce Departments.…

Identity and Access Management Best Practices

Identity and access management (IAM) is fundamental to modern cybersecurity and operational efficiency. It allows organizations to secure their data, comply with regulations, improve user productivity, and build a strong foundation for trustworthy and successful business operations. A robust IAM…

Best Practices To Secure Data Transmission

In today’s interconnected global marketplace, secure data transmission is more crucial than ever. As digital platforms become increasingly important for financial transactions and personal communications, ensuring the integrity and confidentiality of data is vital. If someone gets unauthorized access to…

Implementing Zero-Trust in Enterprise Environments

In the face of ever-changing threats and complex infrastructures, the zero-trust architecture represents an important transformation in our understanding and implementation of security. This innovative approach promises not only increased protection but also increased adaptability and efficiency in infrastructure management.…

Unveiling Vulnerabilities via Generative AI

Code scanning for vulnerability detection for exposure of security-sensitive parameters is a crucial practice in MuleSoft API development.  Code scanning involves the systematic analysis of MuleSoft source code to identify vulnerabilities. These vulnerabilities could range from hardcoded secure parameters like…

One-Click Deploying EMQX MQTT Broker on AWS Using Terraform

MQTT is a lightweight messaging protocol commonly used in IoT (Internet of Things) applications to enable communication between devices. As a popular open-source MQTT broker, EMQX provides high scalability, reliability, and security for MQTT messaging. By using Terraform, a widespread…

One-Click Deploying EMQX MQTT Broker on Azure Using Terraform

MQTT is a lightweight messaging protocol used in the Internet of Things (IoT) to enable communication between devices. As a popular open-source MQTT broker, EMQX provides high scalability, reliability, and security for MQTT messaging. By using Terraform, a widespread Infrastructure…

Creating a Custom Starter With Spring Boot 3

Starters are an integral part of the Spring Boot application. In addition to dependency versioning, they provide the ability to describe the configuration for a particular functionality. They gained their popularity due to the development of microservice architecture. When we…

How To Check Office Files for Macros Using Java

The Microsoft OpenXML files we use on a day-to-day basis are conveniently designed to be accessed and manipulated programmatically. We can jump into any OpenXML file structure in a variety of capacities (usually via specialized programming libraries or APIs) to…

CockroachDB TIL: Volume 13

Previous Articles Volume 1 Volume 2 Volume 3 Volume 4 Volume 5 Volume 6 Volume 7 Volume 8 Volume 9 Volume 10 Volume 11 Volume 12 Topics Topic 1: Diagnose certificate-based authentication Topic 2: Differences between cockroach and psql clients…

Applications and SaaS Plugins: Data Exfiltrations

Since most security administrators have little insight into cloud-to-cloud connections, monitoring and protecting data throughout these communications is challenging. This article will examine the issue and potential remedies.  What Exactly Is a ‘Plug-In’ in a SaaS System? A plug-in SaaS…

Harnessing Security by Adopting Zero Trust Architecture

Over the past several years, Zero Trust Architecture (ZTA) has gained increased interest from the global information security community. Over the years, several organizations have adopted Zero Trust Architecture (ZTA) and experienced considerable security improvements. One such example is Google,…

10 Keys To Securing Software Release and Delivery

The failure to provide adequate security for software releases and delivery is becoming costlier day by day, and the impact is enormous: business disruption, lost sales, damaged reputations, frustrated users, and more. Security breaches can happen within any stage of…

Regulations vs. DevSecOps: Requiem

In this 15-minute lightning talk, Diptesh “Dips” Mishra, CTO for Shoal (a Standard Chartered Venture) talks about the governance challenges that financial services organizations face when they look to adopt DevSecOps. Dips has worked for Nationwide, Lloyds Banking Group, and…

Configuring SSO Using WSO2 Identity Server

Single sign-on is a feature that allows users to access more than one application with the same credentials. This article shows how we can configure SSO using the WSO2 Identity Server. There is a cab company called Pickup that has…

Bracing for the AI-Driven Cybersecurity Landscape of Tomorrow

Maria Markstedter, founder of Azeria Labs and security researcher specialized in mobile and IoT security, was the opening keynote at BlackHat 2023 — Guardians of the AI Era: Navigating the Cybersecurity Landscape of Tomorrow. Markstedter provided an enlightening look at…

What Are X-forwarded Headers, and Why Is It Used?

HTTP headers are essential elements in the communication between clients (e.g., web browsers) and servers on the internet. They contain metadata, which is additional information about the client or the request being made. These headers allow clients and servers to…

Logging Incoming Requests in Spring WebFlux

In the world of modern software development, meticulous monitoring and robust debugging are paramount. With the rise of reactive programming paradigms, Spring WebFlux has emerged as a powerful framework for building reactive, scalable, and highly performant applications. However, as complexity…

Android App Modularization: 4 Useful Tips to Start

Android app modularization refers to the process of breaking down an Android app into smaller, independent modules. These modules can be thought of as building blocks that can be combined to form the complete app. Each module is typically responsible…

Four Practical Ways To Make Your Software More Secure

Our ever-increasing reliance on technology has made software security more crucial than ever. Business owners and individuals use software every day, and that isn’t changing any time soon.  Developers are responsible for creating software that can stand up against a…

Combatting the OpenSSH Vulnerability

Time and again, we encounter stark reminders that every piece of software, no matter how widespread its use or how thoroughly it is reviewed, has the potential to harbor security vulnerabilities. A recent case in point is a security flaw…

The Rising Risks and Opportunities in API Security

APIs are the digital fabric connecting companies, partners, and customers. But increased reliance on APIs also introduces new security risks. I recently spoke with Michelle McLean, VP of Marketing at API security provider Salt Security during Black Hat 2023 about…

APIs in Motion: Keep Your APIs Up-To-Date

In the rapidly evolving world of technology, software applications have become the backbone of modern society. From mobile apps that streamline our daily tasks to web-based platforms that connect us globally, these applications rely on seamless communication and data exchange.…

“Auth” Demystified: Authentication vs Authorization

One of the most widely held misconceptions is that authorization and authentication are the same, or something your identity provider does. It also doesn’t help that certain authentication vendors blur the line by offering their versions of access controls. But,…

How To Install Istio Using Helm Chart

Istio service mesh helps DevOps engineers and architects manage the network and security of distributed applications without touching the application code. In a previous blog, we explained How to get started with Istio in Kubernetes in 5 steps, where Istio’s…

JWT Token Authentication Using the .NET Core 6 Web API

In this article, we are going to discuss JWT Token authentication and implementation using .NET Core API 6. Before looking into this blog, visit my previous blog: Introduction and Details about JWT Token Authentication and Authorization, to understand the basics…

5 Strategies for Strengthening MQTT Infrastructure Security

Our previous articles of this series explored various methods to safeguard IoT devices from cyberattacks, including encryption, authentication, and security protocols. However, it is crucial to acknowledge that regular updates and maintenance are equally vital to ensure the ongoing security…

Authentication vs. Authorization: What’s the Difference?

Although they are often conflated with each other, Authentication and Authorization, represent two fundamentally different aspects of security that work together in order to protect sensitive information. In this blog, we will go over some of the key differences between…

What Is a Service Mesh and Why Is It Needed for Kubernetes?

Enterprises nowadays are keen on adopting a microservices architecture, given its agility and flexibility. Containers and the rise of Kubernetes — the go-to container orchestration tool — made the transformation from monolith to microservices easier for them. However, a new…

JWT Token Authentication Using the .Net Core 6 Web API

In this article, we are going to discuss JWT Token authentication and implementation using .NET Core API 6. Before looking into this blog, visit my previous blog: Introduction and Details about JWT Token Authentication and Authorization, to understand the basics…

The 6 Pillars of Effective Cloud Security

Cloud security is a top priority for several organizations right now; no doubt about that. However, many companies still find themselves grappling in the dark when it comes to implementing effective cloud security controls. This article addresses challenges businesses might…

How to Implement Deception Technology

Deception technology is a cybersecurity tactic that involves setting traps for potential intruders with fabricated versions of valuable assets. An organization’s security teams are alerted when cybercriminals are lured by this method.  This approach shortens the time required to detect…

Decoupling Storage and Compute: Have We Gone Too Far?

Data engineers discovered the benefits of conscious uncoupling around the same time as Gwyneth Paltrow and Chris Martin in 2014.  Of course, instead of life partners, engineers were starting to gleefully decouple storage and compute with emerging technologies like Snowflake…

10 Benefits of Cloud Computing for SMBs

The rapid adoption of cloud computing is no coincidence. Small and medium-sized businesses (SMBs) businesses are now presented with the opportunity to break free from the constraints of traditional IT infrastructure and enjoy the numerous benefits the cloud has to…

Building Cyber Resilience in an Age of Growing Threats

In an increasingly interconnected world, the need for robust cybersecurity infrastructure resilience is now more critical than ever. Cyberattacks pose significant threats to nations, businesses, and individuals alike, with potentially devastating consequences. It is in this context that we can…

The EVM Compatibility Chronicles Part II

We discussed the fundamentals of EVM, the need for EVM compatibility, and the general benefits in part I of the EVM compatibility chronicles. Now, let’s delve into and explore the significance of EVM compatibility for Humanode, and gain insights directly from MOZGIII,…

Cracking the Code: 7 Secrets Every Web Developer Should Know

Web development is a pillar of contemporary commercial success in the digital world. How a website functions and appears directly influences user experience and, consequently, a company’s triumph in the competitive online realm. Web developers hold the keys to maximizing…

Do’s and Don’ts When Building an Internal Developer Platform

In today’s fast-paced software development landscape, organizations need to provide their internal development teams with the tools and infrastructure necessary to excel. Internal developer platforms have emerged as a powerful solution that enables companies to streamline their software development processes…

Mastering DevOps: Best Practices for Agile Software Delivery

Dive deep into the DevOps world and explore the best practices that can help organizations achieve success in their release processes! Software development and operations have become increasingly intertwined in today’s fast-paced and technology-driven world. DevOps has emerged as a…

Infrastructure as Code: Exploring Terraform’s Dominance

Infrastructure as Code (IaC) has emerged as a pivotal practice in modern software development, enabling teams to manage infrastructure resources efficiently and consistently through code. This analysis provides an overview of Infrastructure as Code and its significance in cloud computing…

Cloud Security in Hybrid and Multi-Cloud

Increasing adoption of SaaS Applications and Web Based solutions created a demand for data and resource sharing. Cloud computing provides a combination of infrastructure, platforms, data storage, and software as services. It has replaced grid computing over the years and…

Penetration Testing: A Comprehensive Guide

Cybersecurity threats are real, and with the enhanced proliferation of digitization in the business landscape today, websites have become an integral part of business communication with customers and partners. Therefore, companies look for new and secure ways to protect their…

How To Approach Dependency Management in Java [Video]

In the video below, we will cover real-life considerations when working with dependencies in Java: How to find and trust the right dependencies How to consistently keep them updated How to protect against vulnerabilities How to handle team backlash against…

jQuery vs. Angular: Common Differences You Must Know

A robust digital presence is essential in today’s business landscape. Web development evolves constantly with new frameworks and libraries for dynamic web applications. These platforms connect with your audience and boost business productivity. Embracing these advancements is vital for success…

Understanding Package.json II: Scripts

Welcome to the world of Javascript development, where building, testing, and deploying applications can be complex and time-consuming. As developers, we strive to automate these tasks as much as possible, and that’s where npm scripts come in. npm scripts are…

The Intersection of CDP and AI: How Artificial Intelligence Is Revolutionizing Customer Data Platforms

In today’s data-driven world, Customer Data Platforms (CDPs) play a pivotal role in helping businesses harness and utilize customer data effectively.   These platforms consolidate data from various sources, providing valuable insights into customer behavior and preferences. They enable businesses to comprehensively understand their customers, facilitating targeted marketing…