How We Used to Handle Security A few years ago, I was working on a completely new project for a Fortune 500 corporation, trying to bring a brand new cloud-based web service to life simultaneously in 4 different countries in…
Tag: DZone Security Zone
Microservices Resilient Testing Framework
Resilience refers to the ability to withstand, recover from, or adapt to challenges, changes, or disruptions. As organizations increasingly embrace the microservices approach, the need for a resilient testing framework becomes important for the reliability, scalability, and security of these…
Secure Password Hashing in Java: Best Practices and Code Examples
In the domain of digital security, password hashing stands as a critical line of defense against unauthorized access. However, the landscape of hashing algorithms has evolved significantly, with some methods becoming obsolete and newer, more secure techniques emerging. This article…
Are the Fears About the EU Cyber Resilience Act Justified?
On Wednesday, July 19, the European Parliament voted in favor of a major new legal framework regarding cybersecurity: the Cyber Resilience Act (CRA). According to the press release following the vote: This article has been indexed from DZone Security Zone…
Anticipating the Journey: Launching Your First Open Source Project
I’ve been deeply immersed in the world of developer products for the past decade, and let me tell you, I’ve been quite an open-source enthusiast. Over the years, I’ve had the pleasure (and occasional pain) of shepherding open-source projects of…
Matching Algorithms in Dating Apps
Modern dating apps have long been a familiar part of our daily lives. Ten years ago, Tinder, Mamba, Pure, and others turned traditional ideas about dating and relationships upside down. Whether we like it or not, dating apps have started…
The Elusive Quest for DevSecOps Collaboration
Despite years of discussing DevSecOps, achieving security and development collaboration remains an uphill battle in most organizations. This article explores why real-world DevSecOps adoption lags behind expectations, common barriers faced, and how the Stream Security platform bridges visibility and policy…
Automate Your SSO With Ansible and Keycloak
The article Deploy Keycloak single sign-on with Ansible discussed how to automate the deployment of Keycloak. In this follow-up article, we’ll use that as a baseline and explore how to automate the configuration of the Keycloak single sign-on (SSO) server,…
With the Right Support, Developers Can Lead Your Organization to Superior PCI-DSS 4.0 Compliance
The Payment Card Industry Data Security Standard (PCI-DSS) version 4.0 will change almost everything about security for any business or organization that accepts electronic payments, which is a vast majority of them. And make no mistake, this update will be…
Using VB.NET To Check for Proxy and VPN With IP2Location.io Geolocation API
Virtual Private Network (VPN) servers are proxy servers that people use daily when browsing the Internet. They use it because it shields them from being tracked by websites. As most of us are aware, websites track their visitors for advertising…