During the software development, builders face challenges between building a better product faster versus dealing with various responsibilities that come with software development. Getting security right is one of them. Due to the increased cyber attacks, organizations started focusing on…
Tag: DZone Security Zone
Why Generative AI Needs Human Oversight to Build Trust
In 2023, a generative AI-powered chatbot for a financial firm mistakenly gave investment advice that violated compliance regulations, triggering regulatory scrutiny. Around the same time, an AI-powered medical summary tool misrepresented patient conditions, raising serious ethical concerns. As businesses rapidly…
Safeguarding Sensitive Data: Content Detection Technologies in DLP
The 2024 IBM Cost of a Data Breach Report found that data breaches cost organizations an average of $4.88 million per incident globally. Many of these breaches were caused by accidental or intentional mishandling of sensitive information. As businesses rely…
Stop Exposing Secrets! Secure Your APIs in Postman Like a Pro
API security is crucial, as it directly impacts your business’s success and safety. How well you secure your APIs can make or mar your product, and it is of utmost importance to spend time thinking about security. I have seen…
AWS WAF Classic vs WAFV2: Features and Migration Considerations
Amazon Web Services Web Application Firewall (AWS WAF) protects web programs against widespread vulnerabilities including SQL injection and cross-scriptability. Amazon Web Services WAFV2, a new WAF Classic service, introduces with it increased agility, elasticity, and operational efficiency. In this article,…
The Role of DevSecOps in Securing Multi-Cloud Architectures
In this article, we will explore how DevSecOps transforms security in multi-cloud ecosystems. Starting with the DevSecOps phase, we will delve into how multi-cloud environments can be implemented effectively and safely. Additionally, we will examine the most significant challenges associated…
Ansible Security and Testing Tools for Automation
Automation has become the cornerstone of modern IT operations, enabling organizations to streamline processes, reduce manual errors, and improve efficiency. However, as automation grows in complexity and scale, security risks also increase. Misconfigured infrastructure, untested playbooks, and vulnerabilities in automation…
Security in the CI/CD Pipeline
As development cycles speed up, integrating security into the CI/CD pipeline is essential to embed security checks early and throughout the process to prevent vulnerabilities from creeping into production. This article delves deeper into the technical details, code examples, and…
A Comprehensive Guide to Protect Data, Models, and Users in the GenAI Era
Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Generative AI: The Democratization of Intelligent Systems. Generative AI (GenAI) is transforming how organizations operate, enabling automation, content generation, and intelligent decision making at an…
Multi-Tenant .NET Applications With Keycloak Realms
Introduction Note: You can download the source from GitHub. I’ve been working on multi-tenant applications in the .NET ecosystem for quite a while, and one of the toughest challenges I consistently run into is secure tenant isolation — especially when…