Enterprise development security
Enterprise development security involves the use of software, hardware, and procedural methods to protect applications from external threats. Enterprise Java security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive enterprise data. Learn design techniques and how to design secure Java applications. Find best practices, examples and strategies for designing security into enterprise Java applications.
New & Notable
Enterprise development security News
-
November 12, 2017
12
Nov'17
Shortcomings of DevOps causes security bug detection to suffer
Eariler this year we spoke with Jim Manco of Manicode security. It was immediately prior to Oracle OpenWorld 2017, in which Manico was delivering a JavaOne session on Java SE 9 security. There are ...
-
October 04, 2017
04
Oct'17
Manico and Grimstad bring Java tech to life at JavaOne 2017
Engaging speakers like Jim Manico or Ivar Grimstad can make all the difference when choosing a session at a conference like JavaOne 2017 than the session syllabus.
-
October 03, 2017
03
Oct'17
Oracle VP talks Java EE 8, Java platform update at JavaOne
Will the future involvement of the Eclipse Foundation lead to a faster and more nimble Java platform update process? Oracle's Michael Lehmann believes it will.
-
October 02, 2017
02
Oct'17
Java SE 9, OpenJDK energize Java community at JavaOne 2017
From the release of Java 9 to the GPL of OpenJDK builds, recent Oracle announcements have energized the Java community, creating a palpable positivity at JavaOne 2017.
Enterprise development security Get Started
Bring yourself up to speed with our introductory content
-
The what, why and how of the Spring Security architecture
Like any framework, Spring Security requires writing less code to implement the desired functionality. Learn how to implement the Spring Security architecture in this book excerpt. Continue Reading
-
A Jenkins tutorial for beginners with examples
If you're ready to try Jenkins, this quick start tutorial lays out the specific steps you'll need to take to download and install the CI tool on your local machine. Continue Reading
-
Use entropy as a service to bolster your security
Cryptographic keys help improve security in your enterprise. Consider entropy as a way to safeguard your data and prevent hackers from picking your locks with faulty keys. Continue Reading
Evaluate Enterprise development security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Why developers need to know the Spring Security framework
The Spring Security framework is a reliable way for Java developers to secure applications. However, proper implementation is critical to prevent the most common vulnerabilities. Continue Reading
-
Fix this runC vulnerability to prevent unwanted root access
Examine a recent vulnerability to the runC container code and what you need to do to prevent unwanted root access and container manipulation in your computing environment. Continue Reading
-
Don't let the DevOps shift left mindset diminish security
The shift left in DevOps philosophy makes some responsibility changes in the delivery process but can generate positive results if properly implemented. Continue Reading
Manage Enterprise development security
Learn to apply best practices and optimize your operations.
-
What's in a name? What developers can expect in Jakarta EE 9
What Oracle called the Java EE API is now called Jakarta EE API under the Eclipse Foundation. Here's what developers can expect in the Jakarta EE 9 release. Continue Reading
-
You need more than web app security to stop API attacks
API and web application vulnerabilities may share some common traits, but it's where they differ that hackers will target. Continue Reading
-
Help your developers create a better IT security model
Developers need to be comfortable with their tools to create a strong security model in an organization. Don't overlook these areas or credentials can end up in the wrong hands. Continue Reading
Problem Solve Enterprise development security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Master-slave terminology alternatives you can use right now
Software companies have found alternatives for master-slave terminology to describe their distributed systems. It's time for the rest of the IT world to do the same. Continue Reading
-
Developers and the enterprise software sales process
Should developers be privy to the ins and outs of software sales? A strong business relationship can be mighty helpful in this expensive and tedious process. Continue Reading
-
Don't contribute to the high IT project failure rate
Enterprise software development is difficult, so it's no surprise to discover there is a high IT project failure rate. Here's how to buck the trend and get yours to succeed. Continue Reading