5 minutes
The Payara Monthly Catch – October 2025
Welcome aboard the October issue of The Monthly Catch!As the leaves turn and conference season hits full stride, the […]

This talk examines implementing Zero Trust security principles within Jakarta EE 11 applications. As enterprise boundaries dissolve through cloud adoption, traditional perimeter-based security fails to protect modern Java applications. I’ll demonstrate how Jakarta EE 11’s security features enable Zero Trust implementations through: – Fine-grained authentication: Leveraging Jakarta Security with OAuth 2.0 and OpenID Connect for context-aware identity verification across microservices – Authorization patterns: Implementing attribute-based access control using Jakarta Security’s evolved authorization model – Continuous validation: Building runtime security monitoring using Jakarta’s CDI events and interceptors Through practical code examples, we’ll create a Zero Trust implementation that includes: – Multi-factor authentication integration within Jakarta applications – Least-privilege access patterns for service-to-service communication – Encrypted data transit using Jakarta’s security annotations We’ll examine a real-world case study of a healthcare application that adopted these patterns, significantly reducing breach exposure while maintaining performance requirements. Attendees will receive a security assessment framework and implementation guide for applying Zero Trust principles within their Jakarta EE environments.
5 minutes
Welcome aboard the October issue of The Monthly Catch!As the leaves turn and conference season hits full stride, the […]
6 minutes
If you’ve been living in the Spring ecosystem, you’re used to fast project setup. Spring Initializr gives you a […]
2 minutes
How outdated Java systems are draining budgets and throttling innovation across financial services? Let’s dig in in this blog […]
Open source communities don’t grow by magic – they grow through people, consistency, and connection. In this talk, we’ll look at what Java User Groups (JUGs) have taught us about the real challenges of building […]