Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Secure Communication with Token-based RSocket
Take a look at how you can establish secure communication with token-based RSocket, and establish a clear understanding of JWT.
April 30, 2020
by
Lu Han
·
10,468 Views
·
4 Likes
Implementing Aqua Security to Secure Kubernetes
In this article, we discuss the benefits of and how you can go about implementing Aqua Security to better secure Kubernetes.
April 30, 2020
by
Agustin Romano
·
1,357,994 Views
·
3 Likes
How to Implement JDBC Authentication and Authorization in Mule 4 Using Spring Security
This tutorial walks step-by-step through how to use JDBC authorization in Mule 4 with Spring Security to provide role based security.
April 30, 2020
by
Harsha Pateelu
·
13,643 Views
·
1 Like
Dependency Injection in Spring
Take a deep dive into Dependency Injection in Spring — what it is, how and when to use, and why it makes Spring such a powerful framework.
Updated April 29, 2020
by
Justin Albano
CORE
·
65,644 Views
·
30 Likes
The Do’s and Don’ts of Cloud Computing
When it's time to seriously consider making the jump to the cloud, take a look at this list of some of the migration patterns and anti-patterns.
Updated April 29, 2020
by
Finlead Logiticks
·
9,207 Views
·
4 Likes
Secure Mule API by Auth0 (External Identity Provider)
In this article, take a look at how to secure a Mule API with Auth0.
April 28, 2020
by
Mukesh Thakur
CORE
·
15,601 Views
·
4 Likes
Angular JWT Autorefresh With Spring Boot
In this article, we discuss how to add autorefresh functionality for JWTs in an Angular application with a Spring Boot backend.
April 27, 2020
by
Sven Loesekann
·
15,052 Views
·
5 Likes
Chaos Mesh — A Solution for System Resiliency on Kubernetes
In the following sections, I will share with you what Chaos Mesh is and how we designed and implemented it.
April 22, 2020
by
Chengwen Yin
·
12,703 Views
·
4 Likes
Authentication with Spring Boot and Spring Security — JWT and Postgres
Take a look at how you can create authentication with REST API calls using JSON Web Tokens.
April 21, 2020
by
Aakash Sharma
·
22,697 Views
·
7 Likes
10 IoT Security Tips You Can Use to Secure Your IoT Devices
While IoT devices and tools have a number of uses and can make life a lot easier, many come with a number of security tradeoffs and vulnerabilities.
April 20, 2020
by
Lumena Mukherjee
·
18,230 Views
·
2 Likes
The Cost of Building an Enterprise API Analytics Platform
In this article, take a look at the cost of building an enterprise API analytics platform.
April 16, 2020
by
Derric Gilling
CORE
·
13,912 Views
·
3 Likes
Create a CRUD App With React, Kotlin, and Spring Boot
This in-depth tutorial will go over how to create a secure CRUD application using a combination of ReactJS, Kotlin, Spring Boot, and OpenID.
April 15, 2020
by
Andrew Hughes
·
31,535 Views
·
30 Likes
Ethereum RPCs, Methods, and Calls
In this tutorial, we bring you an in-depth guide to reading and writing requests to the Ethereum blockchain, using Infura.
April 14, 2020
by
Cheryl Douglass
·
11,241 Views
·
3 Likes
When Drones Go Dark
Drones may seem like tools, but the reality is that a drone can be deployed to cause affray, accidents, and murder.
April 14, 2020
by
Cate Lawrence
CORE
·
10,211 Views
·
2 Likes
Linux Container CPU: How to Optimize Real-Time and I/O-Intensive Environments
Highly-threaded I/O intensive Linux containers running on Kubernetes would have all the CPU time they need — can this be a reality?
Updated April 10, 2020
by
Jay Huang
·
12,988 Views
·
11 Likes
Enforcing MuleSoft JWT Validation Policy Using API Manager API
In this article, we discuss how to apply JWT validation policies using MuleSoft's API Manager API to better help you manage your app's security.
April 7, 2020
by
Jitendra Bafna
CORE
·
23,785 Views
·
6 Likes
Frequently Used Annotations in Spring Boot Applications
Take a look at this cheatsheet of some of the most frequently used annotations in Spring applications, including Core Spring, tests, and security.
April 7, 2020
by
Yevgen Pikus
·
31,778 Views
·
9 Likes
A Brief History of EDR Security
In this article, we break down some fundamental concepts behind Endpoint Detection and Response from 2010 to now.
April 7, 2020
by
Gilad David Maayan
CORE
·
6,867 Views
·
1 Like
AWS Lambda Functions and Layers
Lambda layers provides a way to package dependencies in a clean way and deploy them in response to AWS Lambda calls.
April 3, 2020
by
Mohamed Latfalla
·
7,983 Views
·
7 Likes
Secure Terraform Delivery Pipeline – Best Practices
As Terraform is leading the pack in Infrastructure-As-Code solutions, it's important to know why and how to secure your Terraform pipeline.
March 30, 2020
by
Piotr Gwiazda
·
16,646 Views
·
3 Likes
Previous
...
100
101
102
103
104
105
106
107
108
109
...
Next