“Mobile is becoming not only the new digital hub but also the bridge to the physical world.”– Thomas Husson, VP and Principal Analyst at Forrester Research Mobile devices have become an inevitable part of organizations’ strategies to do more with…
Category: DZone Security Zone
Safeguarding Your Organization: Insights for IT Pros During National Insider Threat Awareness Month
September marks National Insider Threat Awareness Month (NITAM), an annual campaign dedicated to shedding light on the risks posed by trusted insiders. Whether employees, contractors, partners, or collaborators, these authorized individuals have the potential to intentionally or accidentally cause significant…
Securing Your Applications With Spring Security
In today’s increasingly digital world, securing your applications has become paramount. As developers, we must ensure that our applications are protected from unauthorized access and malicious attacks. One popular solution for securing Java applications is Spring Security, a comprehensive and…
What Is Privacy by Design?
Privacy by Design (PbD) is an approach to systems engineering that aims to embed privacy into every stage of the development process and across the entire organization from day one. Privacy is too often overlooked or solely an afterthought. Policies…
Researcher Finds GitHub Admin Credentials of Car Company Thanks to Misconfiguration
On August 21, 2023, security researcher and HackerOne Advisory Board Member Corben Leo announced on social media that he had “hacked a car company” and went on to post a thread explaining how he “gained access to hundreds of their codebases.”…
The Promise of Personal Data for Better Living
Emerging technologies are unlocking new possibilities for gathering and leveraging data from personal devices to provide highly customized and contextualized user experiences. As Dr. Poppy Crum, CTO, and neuroscientist, highlighted in her Technology and Human Evolution presentation at TIBCO Next,…
Fortifying the Cloud: A Look at AWS Shield’s Scalable DDoS Protection
As businesses shift operations to the cloud, robust security is crucial. DDoS attacks pose significant threats to cloud-based services, aiming to disrupt infrastructure and cause downtime and financial losses. AWS Shield from Amazon Web Services provides comprehensive DDoS protection, fortifying…
New Free Tool From Contrast Security Makes API Security Testing Fast and Easy
Developing secure APIs is crucial, but testing them thoroughly can be time-consuming and difficult without the right tools. A new offering called CodeSec from application security provider Contrast Security aims to make robust API security testing quick, accurate, and accessible…
Gradle Version Catalogs on Android
Gradle version catalogs allow us to add and maintain dependencies in an easy and scalable way. Apps grow, and managing projects with several development teams increases the compilation time. One potential solution to address this issue involves segmenting the project…
Spring Authentication With MetaMask
When choosing a user authentication method for your application, you usually have several options: develop your own system for identification, authentication, and authorization, or use a ready-made solution. A ready-made solution means that the user already has an account on…