Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
datasecurity
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Handling Sensitive Information in Automated Processes
Richard Chamberlain
Richard Chamberlain
Richard Chamberlain
Follow
Nov 17
Handling Sensitive Information in Automated Processes
#
passwordmanagement
#
datasecurity
#
automatedprocesses
#
ansibletips
Comments
Add Comment
3 min read
Security Update on Google Chrome Extensions
Willyam simbolon
Willyam simbolon
Willyam simbolon
Follow
Nov 14
Security Update on Google Chrome Extensions
#
cybersecurity
#
datasecurity
#
malware
#
devops
1
reaction
Comments
Add Comment
2 min read
Best Practices for Data Security in Big Data Projects
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 24
Best Practices for Data Security in Big Data Projects
#
bestpractices
#
bigdata
#
datasecurity
Comments
Add Comment
6 min read
Understanding Batch SQL Injection: A Real-World Threat to Data Security
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Nov 4
Understanding Batch SQL Injection: A Real-World Threat to Data Security
#
sql
#
sqlinjection
#
datasecurity
2
reactions
Comments
Add Comment
5 min read
How Wired Internet Could Save Your Data Security
Natasha Ramzan
Natasha Ramzan
Natasha Ramzan
Follow
Oct 1
How Wired Internet Could Save Your Data Security
#
wiredinternet
#
datasecurity
#
internetdatasecurity
Comments
Add Comment
5 min read
Step-by-Step Guide for Setting Up Nextcloud with GDPR Compliance
Khuram Murad
Khuram Murad
Khuram Murad
Follow
Oct 26
Step-by-Step Guide for Setting Up Nextcloud with GDPR Compliance
#
alnafi
#
nextcloud
#
datasecurity
Comments
Add Comment
3 min read
How Wired Internet Could Save Your Data Security
Natasha Ramzan
Natasha Ramzan
Natasha Ramzan
Follow
Sep 19
How Wired Internet Could Save Your Data Security
#
wiredinternet
#
datasecurity
#
internetdatasecurity
Comments
Add Comment
5 min read
Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus
Sennovate
Sennovate
Sennovate
Follow
Aug 12
Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus
#
columbus
#
cybersecurity
#
datasecurity
#
security
Comments
Add Comment
2 min read
How to Keep Consumer Data Secure on Your E-Commerce Website
Lara Lee
Lara Lee
Lara Lee
Follow
Aug 1
How to Keep Consumer Data Secure on Your E-Commerce Website
#
datasecurity
#
security
#
alibabacloud
#
ecommerce
1
reaction
Comments
Add Comment
5 min read
𝐓𝐡𝐞 𝐏𝐬𝐲𝐜𝐡𝐨𝐥𝐨𝐠𝐲 𝐨𝐟 𝐒𝐨𝐜𝐢𝐚𝐥 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠: 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐘𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐧𝐝 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚
Namik Ahmedov
Namik Ahmedov
Namik Ahmedov
Follow
Jul 3
𝐓𝐡𝐞 𝐏𝐬𝐲𝐜𝐡𝐨𝐥𝐨𝐠𝐲 𝐨𝐟 𝐒𝐨𝐜𝐢𝐚𝐥 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠: 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐘𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐧𝐝 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚
#
security
#
datasecurity
5
reactions
Comments
7
comments
1 min read
Implementing Secure Multi-Party Computation (SMPC) with NodeJs: A Practical Guide
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 8
Implementing Secure Multi-Party Computation (SMPC) with NodeJs: A Practical Guide
#
node
#
smpc
#
datasecurity
#
securecoding
2
reactions
Comments
Add Comment
4 min read
Understanding Data Sharing Agreements: A Guide for Business Owners
bocruz0033
bocruz0033
bocruz0033
Follow
Jun 13
Understanding Data Sharing Agreements: A Guide for Business Owners
#
datasharing
#
intellectualproperty
#
datasecurity
Comments
Add Comment
2 min read
Information Classification in Microsoft Purview: A Step-by-Step Guide
Boris Gigovic
Boris Gigovic
Boris Gigovic
Follow
Jun 17
Information Classification in Microsoft Purview: A Step-by-Step Guide
#
informationgovernance
#
informationsecurity
#
datasecurity
#
dataprotection
6
reactions
Comments
Add Comment
5 min read
Mastering Data Security: A Comprehensive Look at NAS Backup Strategies
Caesar Howter
Caesar Howter
Caesar Howter
Follow
May 14
Mastering Data Security: A Comprehensive Look at NAS Backup Strategies
#
datasecurity
#
strategies
#
nasbackup
#
backup
Comments
Add Comment
3 min read
Top 5 things you should be aware of when dealing with AI models
Ana Klaric
Ana Klaric
Ana Klaric
Follow
for
Devōt
Jun 16
Top 5 things you should be aware of when dealing with AI models
#
discuss
#
ai
#
datasecurity
Comments
Add Comment
4 min read
Privacy Assured: Inside Crawlbase's Data Security and Privacy
Crawlbase
Crawlbase
Crawlbase
Follow
May 31
Privacy Assured: Inside Crawlbase's Data Security and Privacy
#
datasecurity
#
dataprivacy
2
reactions
Comments
Add Comment
7 min read
Protecting Your Business in the Digital Age: Why Office 365 Backup Solutions Are Non-Negotiable
Enzo Garcia
Enzo Garcia
Enzo Garcia
Follow
Apr 17
Protecting Your Business in the Digital Age: Why Office 365 Backup Solutions Are Non-Negotiable
#
office365
#
backupsolutions
#
datasecurity
Comments
1
comment
3 min read
What are the Challenges of Cloud Forensics?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Mar 21
What are the Challenges of Cloud Forensics?
#
cloudforensics
#
datasecurity
#
cloudcomputing
#
infosectrain
Comments
Add Comment
3 min read
Azure SQL Database Management: Effective Backup and Restore Practices
Cam Whitmore
Cam Whitmore
Cam Whitmore
Follow
Feb 16
Azure SQL Database Management: Effective Backup and Restore Practices
#
datasecurity
#
backupstrategy
#
azuresql
Comments
Add Comment
3 min read
Hubstaff Enhances Remote Productivity and Facilitates Growth for Top Security and Backup Solutions Provider
Vernon Miller
Vernon Miller
Vernon Miller
Follow
Nov 27 '23
Hubstaff Enhances Remote Productivity and Facilitates Growth for Top Security and Backup Solutions Provider
#
dataprotection
#
datasecurity
#
databackup
Comments
Add Comment
3 min read
Enhancing Big Data Security: Effective Strategies for Identifying and Addressing Threats
Vernon Miller
Vernon Miller
Vernon Miller
Follow
Nov 20 '23
Enhancing Big Data Security: Effective Strategies for Identifying and Addressing Threats
#
data
#
databackup
#
datasecurity
Comments
Add Comment
3 min read
Why acquiring a Cyber Security Certification is good career option?
Kash
Kash
Kash
Follow
Sep 26 '23
Why acquiring a Cyber Security Certification is good career option?
#
cybersecurity
#
networking
#
datasecurity
Comments
Add Comment
2 min read
Password Hashing 101: All About Password Hashing and How it Works
Andy Agarwal
Andy Agarwal
Andy Agarwal
Follow
for
MojoAuth
Apr 25 '23
Password Hashing 101: All About Password Hashing and How it Works
#
webdev
#
cybersecurity
#
datasecurity
#
passwordhashing
Comments
Add Comment
10 min read
Mastodon's Privacy: Who actually holds your data in Mastodon
Privado
Privado
Privado
Follow
Nov 28 '22
Mastodon's Privacy: Who actually holds your data in Mastodon
#
privacy
#
datasecurity
#
mastodon
#
dataprivacy
2
reactions
Comments
1
comment
4 min read
Data Management Best Practices for Modern Backend Data Security
Anita Achu
Anita Achu
Anita Achu
Follow
Jun 30 '22
Data Management Best Practices for Modern Backend Data Security
#
datasecurity
#
backend
#
webdev
#
productivity
7
reactions
Comments
Add Comment
6 min read
Why is Data Security a Developer Service Problem?
Nathan Loding
Nathan Loding
Nathan Loding
Follow
for
Basis Theory
May 12 '22
Why is Data Security a Developer Service Problem?
#
security
#
datasecurity
#
encryption
6
reactions
Comments
Add Comment
5 min read
How to build a secure crypto wallet
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Dec 15 '21
How to build a secure crypto wallet
#
cryptography
#
cryptocurrency
#
appsec
#
datasecurity
9
reactions
Comments
4
comments
1 min read
What is Cybersecurity?
Hamza Mehmood
Hamza Mehmood
Hamza Mehmood
Follow
Sep 19 '21
What is Cybersecurity?
#
cybersecurity
#
security
#
websecurity
#
datasecurity
2
reactions
Comments
Add Comment
1 min read
What is Data Control?
Team RudderStack
Team RudderStack
Team RudderStack
Follow
for
RudderStack
Sep 29 '21
What is Data Control?
#
data
#
privacy
#
rudderstack
#
datasecurity
2
reactions
Comments
Add Comment
6 min read
Databunker - a new vault project
Yuli
Yuli
Yuli
Follow
Jun 24 '21
Databunker - a new vault project
#
datasecurity
#
privacy
#
cybersecurity
#
gdpr
3
reactions
Comments
Add Comment
1 min read
What is Chaos Engineering: Theory, Principles & Benefits
Abe Dearmer
Abe Dearmer
Abe Dearmer
Follow
for
Xplenty inc.
Jan 28 '21
What is Chaos Engineering: Theory, Principles & Benefits
#
bigdata
#
datasecurity
#
datascience
#
database
3
reactions
Comments
Add Comment
6 min read
Revolutionizing Data Security by Design
Pratik Shivaraikar
Pratik Shivaraikar
Pratik Shivaraikar
Follow
for
daily.dev
Aug 21 '20
Revolutionizing Data Security by Design
#
encryption
#
homomorphic
#
datasecurity
#
cloudsecurity
6
reactions
Comments
Add Comment
8 min read
Prevent SQL Injections
crishanks
crishanks
crishanks
Follow
Feb 27 '19
Prevent SQL Injections
#
sql
#
datasecurity
#
ruby
#
activerecord
17
reactions
Comments
4
comments
5 min read
Devart SecureBridge Now Supports Android 64-bit
Devart Software
Devart Software
Devart Software
Follow
Jan 8 '20
Devart SecureBridge Now Supports Android 64-bit
#
android
#
delphi
#
datasecurity
#
security
6
reactions
Comments
Add Comment
1 min read
The Technologies Shaping the Future of Data Security
Brett Clawson
Brett Clawson
Brett Clawson
Follow
Jan 23 '19
The Technologies Shaping the Future of Data Security
#
datasecurity
#
technology
#
software
4
reactions
Comments
Add Comment
4 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account