3 minutes
End-of-Life Technology: How to Drive Innovation Without Compromising Stability
When legacy systems approach end-of-life (EOL), enterprise IT teams typically face the choice of moving forward at all costs […]

This talk examines implementing Zero Trust security principles within Jakarta EE 11 applications. As enterprise boundaries dissolve through cloud adoption, traditional perimeter-based security fails to protect modern Java applications. I’ll demonstrate how Jakarta EE 11’s security features enable Zero Trust implementations through: – Fine-grained authentication: Leveraging Jakarta Security with OAuth 2.0 and OpenID Connect for context-aware identity verification across microservices – Authorization patterns: Implementing attribute-based access control using Jakarta Security’s evolved authorization model – Continuous validation: Building runtime security monitoring using Jakarta’s CDI events and interceptors Through practical code examples, we’ll create a Zero Trust implementation that includes: – Multi-factor authentication integration within Jakarta applications – Least-privilege access patterns for service-to-service communication – Encrypted data transit using Jakarta’s security annotations We’ll examine a real-world case study of a healthcare application that adopted these patterns, significantly reducing breach exposure while maintaining performance requirements. Attendees will receive a security assessment framework and implementation guide for applying Zero Trust principles within their Jakarta EE environments.
3 minutes
When legacy systems approach end-of-life (EOL), enterprise IT teams typically face the choice of moving forward at all costs […]
3 minutes
Working with enterprise Java databases can sometimes feel like swimming upstream. Jakarta EE 11’s Jakarta Data helps developers glide […]
2 minutes
The recent releases of Spring Framework 7.0 and Spring Data 2025.1.0 mark an important milestone for the Java ecosystem, […]
This webinar explores how to apply Zero Trust security principles to Jakarta EE 11 applications in cloud based and distributed environments. As enterprise boundaries continue to disappear, traditional perimeter defenses no longer provide sufficient protection. […]