;
;

DZone Security Zone

Recent posts in Security on DZone.com

Shift-Left Strategies for Cloud-Native and Serverless Architectures

The growth observed in modern-day cloud applications is staggering to say the least. Applications are being built faster and deployed at a faster p...
Posted on 26 December 2025 | 6:00 pm

The Architect's Guide to Logging

Every developer and architect thinks they understand logging until they’re staring at a production issue at 3:00 a.m. Realizing that their logs lac...
Posted on 26 December 2025 | 2:00 pm

Penetration Testing Strategy: How to Make Your Tests Practical, Repeatable, and Risk-Reducing

Penetration testing — “pentesting” — still surprises teams. Some treat it as a checkbox before launch; others expect it to magically find every vul...
Posted on 24 December 2025 | 6:00 pm

Blockchain + AI Integration: The Architecture Nobody's Talking About

Walk into any tech conference today, and you'll hear buzzwords flying: AI this, blockchain that. But ask anyone about the actual architecture requi...
Posted on 23 December 2025 | 5:00 pm

A Practical Guide to Blocking Cyber Threats

As cyberthreats dominate the news headlines day after day, it is important for large multinational organizations and nonprofits to take immediate n...
Posted on 23 December 2025 | 2:00 pm

Phantom APIs: The Security Nightmare Hiding in Your AI-Generated Code

The call came at 2:47 AM on a Tuesday in October 2024. I'd been following API security incidents for fifteen years, but this one made my coffee go ...
Posted on 22 December 2025 | 8:00 pm

Defect Report in Software Testing: Best Practices for QA and Developers

Defects are an unavoidable part of software development. But when they slip into production and reach your customers, the consequences go beyond po...
Posted on 22 December 2025 | 2:00 pm

Fortifying Cloud Security Operations with AI-Driven Threat Detection

With the rapid adoption of cloud technologies, organizations are rushing to migrate their workloads and data to the cloud — often at a breakneck pa...
Posted on 19 December 2025 | 5:00 pm

Zero Trust Model for Nonprofits: Protecting Mission in the Digital Age

In an increasingly globally connected world, nonprofit organizations are as much at risk and vulnerable to cyber threats as large multinational cor...
Posted on 19 December 2025 | 4:00 pm

Why Your UEBA Isn't Working (and How to Fix It)

User Entity Behavior Analysis (UEBA) is a security layer that uses machine learning and analytics to detect threats by analyzing patterns in user a...
Posted on 18 December 2025 | 3:00 pm

Agentic AI in Cloud-Native Systems: Security and Architecture Patterns

AI has long progressed past statistical models that generate forecasts or probabilities. The next generation of AI systems is agents, autonomous cl...
Posted on 18 December 2025 | 12:00 pm

Zero Trust in CI/CD Pipelines: A Practical DevSecOps Implementation Guide

Securing modern CI/CD pipelines has become significantly more challenging as teams adopt cloud-native architectures and accelerate their release cy...
Posted on 12 December 2025 | 8:00 pm

Secrets in Code: Understanding Secret Detection and Its Blind Spots

In a world where attackers routinely scan public repositories for leaked credentials, secrets in source code represent a high-value target. But eve...
Posted on 12 December 2025 | 6:30 pm

Blockchain Use Cases in Test Automation You’ll See Everywhere in 2026

The rapid evolution of digital ecosystems has placed test automation at the center of quality assurance for modern software. But as systems grow in...
Posted on 12 December 2025 | 4:00 pm

Advanced Docker Security: From Supply Chain Transparency to Network Defense

Introduction: Why Supply Chain and Network Security Matter Now In 2021, the Log4Shell vulnerability exposed a critical weakness in modern software:...
Posted on 11 December 2025 | 3:00 pm

How Migrating to Hardened Container Images Strengthens the Secure Software Development Lifecycle

Container images are the key components of the software supply chain. If they are vulnerable, the whole chain is at risk. This is why container ima...
Posted on 10 December 2025 | 7:00 pm

Building Trusted, Performant, and Scalable Databases: A Practitioner’s Checklist

Editor’s Note: The following is an article written for and published in DZone’s 2025 Trend Report, Database Systems: Fusing Transactional Speed and...
Posted on 10 December 2025 | 4:00 pm

When Dell's 49 Million Records Walked Out the Door: Why Zero Trust Is No Longer Optional

I've spent the better part of two decades watching companies learn hard lessons about security. But nothing prepared me for what I saw unfold in 20...
Posted on 10 December 2025 | 2:00 pm

Reproducibility as a Competitive Edge: Why Minimal Config Beats Complex Install Scripts

The Reproducibility Problem Software teams consistently underestimate reproducibility until builds fail inconsistently, environments drift, and ins...
Posted on 9 December 2025 | 6:00 pm

Top 5 Tips to Shrink and Secure Docker Images

I used to settle for Docker images that were massive, sometimes in GBs. I realized that every megabyte matters, impacting everything from deploym...
Posted on 9 December 2025 | 1:00 pm