Related Content
New Non-Language Features in Java 17 Java 17, the latest Long Term Support (LTS) version, has added new non-language features such as pseudo-random number generators. |
||
Choosing a Data Processing Framework With an assortment of open source data processing frameworks available, it may become a developer’s quandary as to which is the most suitable. More often than not, multiple frameworks are used in the same application. |
||
New Language Features in Java 17 As Java 17 is the latest Long Term Support (LTS) version after Java 11, it is opportune to go over the new language features it adds, some of which had been Preview features in intermediate versions. |
||
Why Are Credential Stuffing Attacks On The Rise? Malicious hackers have an abundance of attack methods at their disposal, ranging from the crude to the highly sophisticated. Credential stuffing is a type of brute force cyber attack that is increasing in popularity, and this article seeks to explain why. |
||
The Importance of Data Classification in a Post-GDPR World Automated data classification can have a range of benefits. These include making it possible to organize and secure data for compliance purposes, assisting with deletion of data that is no longer needed, enabling monitoring and alerting, and reducing the cost of compliance. |
||
Losing the Battle One Hill at a Time: Scope Creep in an Agile World Some issues/hills are important and worth going all in – but most probably aren’t. Project managers must choose their battles wisely and develop scope discipline.
|
||
The Rise of Security Challenges for the Data Cloud Data is getting dispersed across numerous databases, microservices, analytics tools, and pipelines. This results in increased security concerns that will soon become “top-of-mind” for engineering and security teams alike. |
||
Why use JSON Web Token (JWT) in Authentication JSON Web Token (JWT) is an open, JSON-based standard for securely transmitting information between parties. In addition to secure information exchange, JWT could be used for authentication. |