Security plays a key role whether you are onboarding customer workloads to the cloud, designing and developing a new product, or upgrading an existing service. Security is critical in every leg of the software development life cycle (SDLC). Application security…
Category: DZone Security Zone
Content Detection Technologies in Data Loss Prevention (DLP) Products
Having worked with enterprise customers for a decade, I still see potential gaps in data protection. This article addresses the key content detection technologies needed in a Data Loss Prevention (DLP) product that developers need to focus on while developing…
Docker vs. Podman: Exploring Container Technologies for Modern Web Development
Among the most often used containerizing technologies in the realm of software development are Docker and Podman. Examining their use cases, benefits, and limitations, this article offers a thorough comparison of Docker and Podman. We will also go over useful…
How To Check and Update Newer Versions for Dependencies in Maven Projects
With the passing of time, new versions of the dependencies are released into the market. We need to update the respective dependencies versions in the project as these versions have new changes and fixes for the security vulnerabilities. It is…
How You Can Avoid a CrowdStrike Fiasco
By now we’ve all heard about — or been affected by — the CrowdStrike fiasco. If you haven’t, here’s a quick recap. An update to the CrowdStrike Falcon platform, pushed on a Friday afternoon, caused computers to crash and be…
Why You Should Use Buildpacks Over Docker
Docker is the obvious choice for building containers, but there is a catch: writing optimized and secure Dockerfiles and managing a library of them at scale can be a real challenge. In this article, I will explain why you may…
Not All MFA Is Equal: Lessons From MFA Bypass Attacks
One-time passwords are one of the most relied-on forms of multi-factor authentication (MFA). They’re also failing miserably at keeping simple attacks at bay. Any shared secret a user can unknowingly hand over is a target for cybercriminals, even short-lived TOTPs.…
Harnessing DevOps Potential: Why Backup Is a Missing Piece
We often hear about the importance of developers and the role they play in the success of a business. After all, they are those craftsmen who create the software and apps that make businesses run smoothly. However, there is one…
Reimagining AI: Ensuring Trust, Security, and Ethical Use
The birth of AI dates back to the 1950s when Alan Turing asked, “Can machines think?” Since then, 73 years have passed, and technological advancements have led to the development of unfathomably intelligent systems that can recreate everything from images…
How To Setup OAuth JWT in the Salesforce Connector
In this post, we’ll explain all the steps required to connect a Mule application to Salesforce using the Salesforce connector with the OAuth JWT flow. You can also create your own certificate for the OAuth JWT flow with Salesforce or…