Here's just about everything you could want to know about your favorite packaging techniques for Java—skinny JARs, fat/uber JARs, thin JARS, and hollow JARs.
Zone Leader, John Vester, highlights the details behind Cisco’s 2017 mid-year report - where DeOS, cloud security, and improper DevOps deployments top his personal list of concerns.
Blockchain is one of the more promising technologies out there when it comes to cybersecurity. Read on to find you why, and what issues blockchain is facing.
This article helps database administrators prevent unexpected behavior and crashes by exploring the reasons databases crash, to optimize their performance.
In this article, we give a quick overview of 15 security best practices that your organization should follow to prevent security issues, such as data breaches.
In this article, we build a simple web application in Angular and then show you how to add authentication measures, allowing your users to sign in and out.
Cyberattacks are constantly evolving, so staying diligent about patching your software is crucial. Read on for advice on how to choose a patch management solution.
John Vester discusses the importance of API security and security adoption measures like authentication, API keys, access control, and input validation.
We take a look at image-based exploits that are common to websites, in this case, those that are backed by PHP. We also look at what devs can do to prevent them.