Product and infrastructure engineering teams are not always aligned with the interests of security engineering teams. While product and infrastructure focus on driving business value and delivering practical solutions, security focuses on detection, prevention, and remediation, which can seem less…
Tag: DZone Security Zone
Data Security Solution for US Federal Customers
Federal agencies manage highly classified sensitive data, including personal information, medical records, and tax and income details of all U.S. residents. In some cases, temporary visitor data are also retained. They also handle national security information, including susceptible documents, intergovernmental…
API Security: The Cornerstone of AI and LLM Protection
As artificial intelligence and large language models (LLMs) continue to reshape the technological landscape, the importance of API security has never been more critical. In a recent interview at Black Hat 2024, Tyler Shields, Vice President of Product Marketing at…
What Is SQL Injection and How Can It Be Avoided?
SQLi is one of the code injection techniques that may enable an attacker to modify the queries that the application provides to the database. By far the most frequent and severe web application security threats always hide in web applications that…
The Relationship Between Performance and Security
The software landscape has undergone a profound transformation over the past two decades. In the past, a substantial portion of software was designed for local desktop use. However, today, the norm for computer users is to access web-based software services…
Safeguarding Democracy in the Digital Age: Insights from Day 1 at Black Hat 2024 and Las Vegas Officials
In an era where technology and geopolitics intersect more than ever before, the importance of cybersecurity in maintaining democratic processes cannot be overstated. At Black Hat 2024, global leaders and local officials converged to discuss the challenges and strategies for…
Creating Effective Exceptions in Java Code [Video]
This article will explore the critical topic of creating effective exceptions in your Java code. Exceptions are crucial in identifying when something goes wrong during code execution. They are instrumental in managing data inconsistency and business validation errors. We will…
What Does It Take to Manage an On-Premise vs Cloud Data Security Product?
Before we ponder this question, let’s first understand the major differences between an on-premise and a cloud data security product. An on-premise data security product means the management console is on the enterprise customer’s premises, whereas the security vendor hosts…
Data Fusion: Enhancing Interoperability, Privacy, and Security
< section name=”02b8″> Data is the backbone of AI systems, and though the concept of Big Data quenches the data thirst of most AI systems, most of the data is not fit for use readily. To fully understand the problem…
The Need for Application Security Testing
Security plays a key role whether you are onboarding customer workloads to the cloud, designing and developing a new product, or upgrading an existing service. Security is critical in every leg of the software development life cycle (SDLC). Application security…