Recently, my team encountered a critical production issue in which Apache Airflow tasks were getting stuck in the “queued” state indefinitely. As someone who has worked extensively with Scheduler, I’ve handled my share of DAG failures, retries, and scheduler quirks,…
Category: DZone Security Zone
Security by Design: Building Full-Stack Applications With DevSecOps
Building a full-stack application with Angular (frontend) and Node.js (backend) demands a holistic security approach. Security by design means baking in security from the architecture stage and throughout development, rather than as an afterthought. DevSecOps extends DevOps by integrating security…
How GitHub Copilot Helps You Write More Secure Code
Early-career developers often struggle with secure coding practices. GitHub Copilot, an AI pair programmer, can assist in writing safer code when used wisely. However, guidance is key; a 2021 study found that approximately 40% of Copilot’s generated code had security…
A Guide to Auto-Tagging and Lineage Tracking With OpenMetadata
Tagging metadata and tracking SQL lineage manually is often tedious and prone to mistakes in data engineering. Although essential for compliance and data governance, these tasks usually involve lengthy manual checks of datasets, table structures, and SQL code. Thankfully, advancements…
Proactive Security in Distributed Systems: A Developer’s Approach
Once the product becomes famous and the customer base increases, it is no longer viable to serve the customers using simple systems without too many bottlenecks. Distributed software systems are inevitable, and it is directly related to the growth of…
The Role of AI in Identity and Access Management for Organizations
Introduction Identity and Access Management (IAM) is a key pillar of any organization. It plays a vital role in enterprise security—securing the resources and the data of an organization by making sure only authorized users have access. As the IT infrastructure…
Analyzing Techniques to Provision Access via IDAM Models During Emergency and Disaster Response
Introduction A natural or human-made disaster is a significant concern for populations across the world. It is important that the response to such cases be prompt and effective so that human and financial losses are minimized. In addition, while the…
IoT and Cybersecurity: Addressing Data Privacy and Security Challenges
The Internet of Things has shaken up our lives, connecting everything from smart homes to massive industrial systems in a pretty smooth way. Sure, these tech upgrades make our day-to-day so much easier, but they have also brought some real…
Securing the Future: Best Practices for Privacy and Data Governance in LLMOps
Over the last few years, they have rapidly developed in the field of large language models (LLMs) since these models can now underpin anything, from a customer service chatbot to an enterprise-grade solution. Now that such models are more woven…
Prioritizing Cloud Security Risks: A Developer’s Guide to Tackling Security Debt
In this era of ever-growing digital footprint, decreasing security debt has become so critical for organizations operating in the cloud. The myriads of unresolved security findings expose services vulnerable to emerging threats as well as pose risk to compliance and…