Enterprise development security
Enterprise development security involves the use of software, hardware, and procedural methods to protect applications from external threats. Enterprise Java security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive enterprise data. Learn design techniques and how to design secure Java applications. Find best practices, examples and strategies for designing security into enterprise Java applications.
New & Notable
Enterprise development security News
-
January 19, 2022
19
Jan'22
Principle of least privilege examples & best practices
We see examples of the principle of least privilege everywhere in our daily lives. What does the principle of least privilege mean as applied to security in software development and DevOps?
-
January 08, 2022
08
Jan'22
How chmod numbers work explained by example
Don't let yourself be intimidated by chmod numbers and permissions. Here's a quick and easy to understand explanation of how chmod permission numbers work in Linux.
-
November 12, 2017
12
Nov'17
Shortcomings of DevOps causes security bug detection to suffer
Eariler this year we spoke with Jim Manco of Manicode security. It was immediately prior to Oracle OpenWorld 2017, in which Manico was delivering a JavaOne session on Java SE 9 security. There are ...
-
October 04, 2017
04
Oct'17
Manico and Grimstad bring Java tech to life at JavaOne 2017
Engaging speakers like Jim Manico or Ivar Grimstad can make all the difference when choosing a session at a conference like JavaOne 2017 than the session syllabus.
Enterprise development security Get Started
Bring yourself up to speed with our introductory content
-
The what, why and how of the Spring Security architecture
Like any framework, Spring Security requires writing less code to implement the desired functionality. Learn how to implement the Spring Security architecture in this book excerpt. Continue Reading
-
A Jenkins tutorial for beginners with examples
If you're ready to try Jenkins, this quick start tutorial lays out the specific steps you'll need to take to download and install the CI tool on your local machine. Continue Reading
-
Use entropy as a service to bolster your security
Cryptographic keys help improve security in your enterprise. Consider entropy as a way to safeguard your data and prevent hackers from picking your locks with faulty keys. Continue Reading
Evaluate Enterprise development security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Collaboration is key to a secure web application architecture
Author Andrew Hoffman explains the importance of a secure web application architecture and how to achieve it through collaboration between software and security engineers. Continue Reading
-
Why developers need to know the Spring Security framework
The Spring Security framework is a reliable way for Java developers to secure applications. However, proper implementation is critical to prevent the most common vulnerabilities. Continue Reading
-
Fix this runC vulnerability to prevent unwanted root access
Examine a recent vulnerability to the runC container code and what you need to do to prevent unwanted root access and container manipulation in your computing environment. Continue Reading
Manage Enterprise development security
Learn to apply best practices and optimize your operations.
-
What's in a name? What developers can expect in Jakarta EE 9
What Oracle called the Java EE API is now called Jakarta EE API under the Eclipse Foundation. Here's what developers can expect in the Jakarta EE 9 release. Continue Reading
-
You need more than web app security to stop API attacks
API and web application vulnerabilities may share some common traits, but it's where they differ that hackers will target. Continue Reading
-
Help your developers create a better IT security model
Developers need to be comfortable with their tools to create a strong security model in an organization. Don't overlook these areas or credentials can end up in the wrong hands. Continue Reading
Problem Solve Enterprise development security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Master-slave terminology alternatives you can use right now
Software companies have found alternatives for master-slave terminology to describe their distributed systems. It's time for the rest of the IT world to do the same. Continue Reading
-
Developers and the enterprise software sales process
Should developers be privy to the ins and outs of software sales? A strong business relationship can be mighty helpful in this expensive and tedious process. Continue Reading
-
Don't contribute to the high IT project failure rate
Enterprise software development is difficult, so it's no surprise to discover there is a high IT project failure rate. Here's how to buck the trend and get yours to succeed. Continue Reading