Datadog has 600+ out-of-the-box integrations that cover a variety of technologies, from web servers to databases to 3rd party SaaS services. For many of these integrations, there are agent configuration files that require storing credentials for the technology. The larger…
Category: DZone Security Zone
Why You Don’t Need That New JavaScript Library
Libraries can rise to stardom in months, only to crash and fade into obscurity within months. We’ve all seen this happen in the software development world, and my own journey has been filled with “must-have” JavaScript libraries, each claiming to…
Implementing and Testing Cryptographic Primitives With Go
Implementing cryptographic primitives securely is crucial for maintaining the integrity, confidentiality, and authenticity of data in Go applications. This guide will walk you through the process of implementing and testing various cryptographic primitives using Go’s standard library and best practices.…
Why Use AWS Lambda Layers? Advantages and Considerations
I’m originally a .NET developer, and the breadth and depth of this framework are impressive. You probably know the phrase, “When all you have is a hammer, everything looks like a nail.” Nevertheless, although I wrote a few articles about…
The Evolution of User Authentication With Generative AI
Remember when you had to squint at wonky text or click on traffic lights to prove you’re human? Those classic CAPTCHAs are being rendered obsolete by the day. As artificial intelligence improves, these once-reliable gatekeepers let automated systems through. That…
Balancing Security and UX With Iterative Experimentation
As transitioning to the digital world is the norm today, businesses face the challenge of constantly maximizing performance while keeping a lookout for potential threats. However, whether it’s spotting fraud in banking and eCommerce, moderating content on social media and…
Secure Your Frontend: Practical Tips for Developers
Let’s face it: frontend security often gets overlooked. With so much focus on UI/UX and performance, it’s easy to assume that back-end APIs and firewalls are taking care of all the heavy lifting. But the reality is that your beautiful…
Multi-Tenant Data Isolation and Row Level Security
Over the past one and a half years, I was involved in designing and developing a multi-tenant treasury management system. In this article, I will share our approaches to the data isolation aspect of our multi-tenant solution and the learnings…
Streamline npm Packages: Optimize and Boost Performance
Sluggish build times and bloated node_modules folders are issues that many developers encounter but often overlook. Why does this happen? The answer lies in the intricate web of npm dependencies. With every npm install, your project inherits not only the…
Implementing Zero Trust Security in Kubernetes
Kubernetes has grown to become the go-to platform for container orchestration. While the flexibility and scalability that make Kubernetes interesting also present substantial security challenges, perimeter-based security has become outdated in these organizations, and thus, they are willing to switch…