When it comes to secure web applications, we must keep sensitive data secure during the communication period. Sadly, while HTTPS encrypts data as it moves from point A to point B, the information is still exposed in a browser’s network…
Category: DZone Security Zone
How To Implement a Gateway With Spring Cloud
A microservice system could have a high number of components with complex interactions. It is important to reduce this complexity, at least from the standpoint of the clients interacting with the system. A gateway hides the microservices from the external…
Pilot VPC and Advanced NAT: Securely Connect Overlapping Networks to AWS VPC
In today’s dynamic business environment, cloud computing has become a crucial enabler, offering enterprises unmatched scalability, flexibility, and cost-efficiency. Amazon Web Services (AWS), a leading cloud service provider, has transformed how organizations manage their IT infrastructures and applications. With AWS…
How Behavioral Biometrics Enhances Fraud Prevention
Today’s fraud prevention processes are far smoother than they used to be. Automated alert systems and authentication measures are now standard, but these relatively simple, rules-based solutions are still imperfect. The growing field of behavioral biometrics offers a more reliable…
Shadow IT: The Unavoidable Reality and How To Embrace It Safely
In a world where innovation and productivity are paramount, the rise of Shadow IT has become an unavoidable reality for many organizations. A recent survey by Next DLP revealed a startling statistic: 73% of security professionals admitted to using unauthorized…
Security Challenges in AI-Powered Applications
AI is revolutionizing how Software-as-a-Service (SaaS) applications work, making them more efficient and automated than ever before. However, this rapid progress has opened up a Pandora’s box of new security threats. From the sly manipulation of data to the gradual…
Empowering Developers in Code Security
Effective security requires a shared responsibility model. Developers are already overburdened with their primary tasks of writing code and delivering features, and we think it is not realistic to expect them to know everything about security, be responsible for triaging…
A Guide to Security Controls for Risk-Based API Protection
In the interconnected world of today, APIs (Application Programming Interface) are the invisible bridges that let applications talk to one another. But to those that with great power, there must also come great responsibility! They need to be able to…
Poetry Explained: Perils of the Unpinned Dependencies
Imagine this: You are days away from a release, and your Python codebase is versioned, tagged, and marked as a Release Candidate. Hours from the release, out of nowhere appears a BUG! You set up a War Room, dig through…
Poetry Explained: Perils of the Unpinned Dependencies
Imagine this: You are days away from a release, and your Python codebase is versioned, tagged, and marked as a Release Candidate. Hours from the release, out of nowhere appears a BUG! You set up a War Room, dig through…