Блог DZone Security | DevsDay.ru

IT-блоги Блог DZone Security

IT-блоги Блог DZone Security

Безопасность DZone Security 20 апреля 2021 г. 18:05

Introduction From telegraphs to online video calls and from fax machines to emails, the communication means have evolved exceptionally. Now the world has shifted from wired networks to wireless transmission, the internet being the most significant mo...... читать далее

mobile secuirty nfc identification nfc smartphone nfc top 5 security issues

Безопасность DZone Security 16 апреля 2021 г. 23:22

Tuesday, April 13 marks Identity Management Day — a time to bring awareness to business leaders, IT decision-makers, and others about the importance of managing and securing digital identities. It’s a nice concept: businesses coming together to...... читать далее

security it cyber security identity management identity access management digital identity

Безопасность DZone Security 16 апреля 2021 г. 16:42

Introduction Do you know that cloud service acquisition is evolving so swiftly that it has grown up to 35% in 2021? Nearly every business that you can possibly think of is utilizing public cloud computing services for most of their critical business...... читать далее

cloud cloud computing artifical intelligence cyber security cyber attack cyber crime security & defense security analysis cloud computing definition

Безопасность DZone Security 15 апреля 2021 г. 17:55

This week, we obviously have to discuss the hundreds of millions of Facebook and Clubhouse user profiles that were scraped using APIs. In other news, Forrester has published their fresh and insightful report “The State of Application Security”, and t...... читать далее

api facebook cybersecurity apis api security newsletter forrester

Безопасность DZone Security 14 апреля 2021 г. 23:12

Introduction Software Security is important more than ever in today's world. If we embed the security in the development phase of the application it not only benefits the overall security adherence but also creates multiple security checkpoints at mu...... читать далее

java security tutorial best practices secure coding security and defense

Безопасность DZone Security 8 апреля 2021 г. 17:48

Introduction In this tech-oriented world where a number of hackers and technological advancements are emerging in parallel to each other, artificial intelligence has made big strides recently in understanding languages. Contrary to this, artificial i...... читать далее

cybersecurity cyber attacks ai algorithm ai algorithms ai and blockchain

Безопасность DZone Security 8 апреля 2021 г. 17:28

This week, we check out the recent API vulnerabilities at VMware and GitLab, how URL parameters can lead to server-side request forgery (SSRF) vulnerabilities, and the upcoming webinar on some of the recent real-life API security flaws. Vulnerability...... читать далее

api apis api security newsletter cybersecuity ssrf

Безопасность DZone Security 8 апреля 2021 г. 16:02

Introduction Is your company’s IT environment adequately secured? If your business relies heavily on the internet and technology, cybersecurity has to be a critical and significant part of operations. To ensure the cybersecurity measures you ado...... читать далее

cybersecurity security audit cybersecurity analysis security and defense it environment security assessment

Безопасность DZone Security 7 апреля 2021 г. 23:59

SSL certificates are very important for authenticating websites and ensuring connections are encrypted. However, there are some scenarios when they can create headaches. Rather than throw the baby out with the bathwater and abandon the use of SSL, yo...... читать далее

security ssl certificate sql (structured query language)

Безопасность DZone Security 7 апреля 2021 г. 1:45

Last time, I talked about the perils of leaving secrets in open-sourced code and how to detect those secrets using regex and entropy analysis: https://blog.shiftleft.io/scanning-for-secrets-in-source-code-9fcb486f8c0e. Hardcoded secrets are an exampl...... читать далее

security software development data compliance information security sast scanning sensitive data data leak

Безопасность DZone Security 6 апреля 2021 г. 14:27

Introduction Secrets are a form of distilled trust. They may be API keys, passwords, certificates, and other forms of key material. Generally, such credentials have a few major properties that make them more useful than just granting trust: They ca...... читать далее

security api keys tokens downtime key rotation security keys

Безопасность DZone Security 5 апреля 2021 г. 8:30

How It Works It’s possible to attach an IAM role in a Kubernetes POD without using third-party software, such as kube2iam and kiam. This is thanks to the integration between AWS IAM and Kubernetes ServiceAccount, following the approach of IAM Role...... читать далее

cloud tutorial aws kubernetes cloud security k8s eks aws security kubernetes security aws iam

Безопасность DZone Security 5 апреля 2021 г. 7:08

Multi-Factor Authentication (MFA) is a security mechanism wherein a user is granted access only after providing more than one method of authentication. An organization administrator can make it mandatory for all non-SSO users to use MFA, exempt some...... читать далее

tutorial authentication mule 4 anypoint platform cloudhub

Безопасность DZone Security 1 апреля 2021 г. 0:42

Earlier this month, news broke that hackers breached Verkada, a major provider of surveillance cameras to a variety of facilities throughout the US, gaining access to 150,000 live feeds. Among those compromised were Tesla, jail cells, private homes,...... читать далее

security cyber attack data breach security by design

Безопасность DZone Security 31 марта 2021 г. 23:49

With today's world of constant digitization, enterprises are continuously shifting their workload to the IaaS platform from the legacy infrastructure because of its speed and flexibility. Gartner expects IaaS to grow by nearly 13.4% to $50.4 billion...... читать далее

cloud security iaas cloud storage data storage sla

Безопасность DZone Security 31 марта 2021 г. 6:45

Cybercriminals are following businesses as they are moving towards digital space. If you are still utilizing old traditional cybersecurity strategies, it’s time to level up. Cybercriminals are floating on cloud nine in this era where the whole world...... читать далее

cloud cybersecurity cyber attack technological advancements security attack

Безопасность DZone Security 30 марта 2021 г. 12:16

It’s easy to see why more consumers are switching to digital payment methods: it’s more convenient, easier to track, and reduces contact. To keep up with consumer expectations, eCommerce websites must ensure their payment channels are secure and seam...... читать далее

software testing payment app gateway application

Безопасность DZone Security 29 марта 2021 г. 17:16

Secure coding practices are proven to reduce the number of vulnerabilities introduced. However, not all developers are well versed in security. There is a lot of training material available but it often takes hours of reading to get a good understand...... читать далее

security secure coding security training shiftleft

Безопасность DZone Security 28 марта 2021 г. 13:33

With increased Cybersecurity challenges, firms are constantly battling to bring down the Mean Time to Detect/Discover (MTTD) of security threats. This is critical for multiple aspects such as customer satisfaction, legal compliance, and creditability...... читать далее

security analytics kibana logstash cybersecuity threat intelligence siem elastic stack

Безопасность DZone Security 25 марта 2021 г. 21:37

Have you been searching for a penetration testing tool that would best serve your security testing requirements for web applications and networks? Do you want to compare and analyze different penetration testing tools and decide on which one(s) would...... читать далее

security testing vulnerabilites penetration testing tools simulated security attacks

Популярные темы

новости (393) ux (363) design (329) headline (271) python (226) ubuntu (220) ux-design (218) devops (206) новость (204) javascript (201) web dev (193) security (188) seo (150) tutorial (141) working in tech (137) дайджесты вакансий от new.hr (136) статьи (131) ui (127) programming (118) testing roundup (116) software testing (113) user-experience (111) дизайн (99) product-design (94) google (93) java (90) игровые проекты (85) ui-design (84) design-thinking (84) primary (77) api5 (76) технологии (76) движки и конструкторы игр (70) прочее (70) job hunting (68) windows 10 (68) бизнес (68) php (66) bash programming (66) laravel (65) technology (65) debian (61) hardware (60) css (59) linux mint (57) uncategorized (56) обучение (56) мероприятия (56) работа (52) docker (51) español (51) covid-19 (50) web design and applications (49) cloud (49) android (49) case-study (49) chrome (48) турбо-страницы (47) инструкции (46) обзоры (46) tutorials (46) data (45) ux-research (45) machine learning (44) publication (44) angular (44) networking (44) навыки алисы (43) inspiration (43) home page stories (43) разработчики (42) apple (42) kubernetes (42) web (41) art (41) job skills (41) c++ (41) powershell (41) ios (40) kali linux (40) mysql mariadb (40) google ads (39) cybersecurity (39) virtual reality (39) автоматизация (38) wp (38) vue.js (37) маркетинг (37) wordpress (36) aspnet (36) тестирование (36) события (36) arch linux (36) полезное (36) productivity (36) marketing (36) кейсы (35) css 3 (35) events (35) smm (35)