Kubernetes is a robust container orchestration technology that is extensively used for containerized application deployment, scaling, and management. While Kubernetes provides a number of capabilities for protecting containerized workloads, it is critical to understand and handle numerous security aspects in…
Category: DZone Security Zone
Securing Your AWS RDS Instances: Best Practices and Examples
Amazon Web Services (AWS) Relational Database Service (RDS) simplifies the setup, operation, and scaling of a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching, and…
Managing IoT Edge Devices at Scale: Device Lifecycle and Configuration Management
IoT has ushered in an era of unprecedented connectivity and data collection. IoT edge devices, ranging from sensors to industrial machines, have become integral to various industries, offering insights, automation, and efficiency. However, managing a large number of these edge…
Build a Digital Collectibles Portal Using Flow and Cadence (Part 1)
In this tutorial, we’ll learn how to build a website for collecting digital collectibles (or NFTs) on the blockchain Flow. We’ll use the smart contract language Cadence along with React to make it all happen. We’ll also learn about Flow,…
VPN Log vs. Zero-Log Policy: A Comprehensive Analysis
Data, often referred to as the lifeblood of modern businesses, enables organizations to embrace innovations that further enhance productivity. However, harnessing this power comes with great risks. Increasing reliance on data being collected comes with the challenges of safeguarding this…
The Impact of Open-Source Software on Public Finance Management
Many government bodies have historically been averse to open-source software (OSS). Now that OSS has gained popularity and shown what it can do in the private sector, that’s changing. The open-source movement holds significant potential for public agencies, too, especially…
Combating Malware Threats
In the digital age, the security landscape is continually evolving, with malicious actors developing and deploying a variety of sophisticated malware to exploit systems, steal data, and disrupt operations. Understanding the diverse array of malware types is crucial for individuals,…
Evolution of Privacy-Preserving AI: From Protocols to Practical Implementations
Year by year, artificial intelligence evolves and becomes more efficient for solving everyday human tasks. But at the same time, it increases the possibility of personal information misuse, reaching unprecedented levels of power and speed in analyzing and spreading individuals’…
Securing the Keys to the Kingdom: Exploring the Depths of Privileged Access Management (PAM)
In the paradigm of zero trust architecture, Privileged Access Management (PAM) is emerging as a key component in a cybersecurity strategy, designed to control and monitor privileged access within an organization. This article delves into the pivotal role of PAM…
Hardening Apache APISIX With the OWASP’s Coraza and Core Ruleset
The Open Worldwide Application Security Project is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of IoT, system software and web application security. The OWASP provides free and open resources. It is…