Category: DZone Security Zone

Application Security in Technical Product Management

In recent years, the number of cyberattacks has been steadily increasing, and applications have become increasingly targeted. According to a report by Verizon, web applications were the most common target of data breaches in 2022, accounting for over 40% of…

Spring OAuth Server: Token Claim Customization

I wrote previously about the default configuration of Spring oauth-authorization-server. Now let’s jump into how we can customize it to suit our requirements. Starting with this article, we will discuss how we can customize the JWT token claims with default…

Resilience Pattern: Circuit Breaker

In this article, we will explore one of the most common and useful resilience patterns in distributed systems: the circuit breaker. The circuit breaker is a design pattern that prevents cascading failures and improves the overall availability and performance of…

Introduction To Face Authentication With FACEIO in AngularJS

In today’s digital age, security, and user convenience are of paramount importance for web applications. Traditional methods of authentication, such as passwords, while widely used, come with their own set of challenges, including the risk of breaches and the inconvenience…

Architecture Patterns: API Gateway

What Is an API Gateway? An API Gateway is a tool that acts as an intermediary for requests from clients seeking resources from servers or microservices. It manages, routes, aggregates, and secures the API requests. Like previous patterns we have…

How 5G Is Empowering Digital Twins

5G is revolutionizing digital twin technology, enabling faster data transfers, real-time monitoring, seamless collaboration, and advanced security. These features are advancing the capabilities of digital twins and the value organizations can gain from them. What are the benefits of building…

Instant Microservices: Rules for Logic and Security

In this article, see how to build a complete database system, in minutes instead of weeks or months: An API, and, we’ll add UI and logic to make it a microservice Logic and security: Multi-table constraints and derivations, and role-based security…

Essential Security Measures for PDF Documents

Portable Document Format (PDF) is a file format that contains a comprehensive representation of a document, encompassing elements like text, fonts, graphics, and other components. PDF is often considered a secure document format due to its inherent security features. These…