Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
dataprotection
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
GDPR Compliance: A Must-Have for Every Business in the Digital Age
Anupriya
Anupriya
Anupriya
Follow
Jan 17
GDPR Compliance: A Must-Have for Every Business in the Digital Age
#
cybersecurity
#
gdprcompliance
#
dataprotection
#
cyberdefense
Comments
Add Comment
4 min read
5 Reasons Startups Should Consider Using Locker.io for Secrets Management
Meomeo Peo
Meomeo Peo
Meomeo Peo
Follow
Jan 16
5 Reasons Startups Should Consider Using Locker.io for Secrets Management
#
secretsmanagement
#
cybersecurity
#
dataprotection
#
apisecurity
Comments
Add Comment
2 min read
Essential Security Measures for Safeguarding Your System and Protecting User Data
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Jan 16
Essential Security Measures for Safeguarding Your System and Protecting User Data
#
systems
#
systemsecurity
#
dataprotection
Comments
Add Comment
7 min read
How AWS Security Works: Protecting Your Cloud Infrastructure and Data
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 27 '24
How AWS Security Works: Protecting Your Cloud Infrastructure and Data
#
aws
#
cloudsecurity
#
dataprotection
#
awscloud
Comments
Add Comment
5 min read
The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Dec 26 '24
The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance
#
fintech
#
dataprotection
#
cybersecurity
#
compliance
Comments
Add Comment
2 min read
Zero-Day Vulnerabilities: A Growing Threat to Your digital Safety
Anupriya
Anupriya
Anupriya
Follow
Dec 23 '24
Zero-Day Vulnerabilities: A Growing Threat to Your digital Safety
#
vulnerabilities
#
zeroday
#
dataprotection
#
informationsecurity
Comments
Add Comment
3 min read
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data
Anupriya
Anupriya
Anupriya
Follow
Dec 10 '24
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data
#
vulnerabilityremediation
#
cybersecurity
#
dataprotection
#
informationsecurity
Comments
Add Comment
3 min read
2025 Cybersecurity Resolutions: How to Tackle Emerging Threats Before They Happen
Anupriya
Anupriya
Anupriya
Follow
Jan 9
2025 Cybersecurity Resolutions: How to Tackle Emerging Threats Before They Happen
#
cybersecurity
#
resolutions2025
#
dataprotection
#
informationsecurity
Comments
1
 comment
5 min read
Comprehensive Data Protection in Kubernetes: Strategies for Securing Sensitive Information and Ensuring Resilience
Raza Shaikh
Raza Shaikh
Raza Shaikh
Follow
Nov 29 '24
Comprehensive Data Protection in Kubernetes: Strategies for Securing Sensitive Information and Ensuring Resilience
#
kubernetes
#
dataprotection
Comments
Add Comment
7 min read
Vishing Scams Explained: What They Are and How to Stay Safe
Anupriya
Anupriya
Anupriya
Follow
Nov 18 '24
Vishing Scams Explained: What They Are and How to Stay Safe
#
vishingscams
#
cybersecurity
#
dataprotection
#
secureinformation
Comments
Add Comment
4 min read
How to Secure Your MySQL Database: Best Practices for Data Protection
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 20 '24
How to Secure Your MySQL Database: Best Practices for Data Protection
#
mysql
#
databasesecurity
#
dataprotection
#
sqlsecurity
Comments
Add Comment
5 min read
Complete Data Protection Guide: Backing Up Proxmox Virtual Machines
iamjoelfox
iamjoelfox
iamjoelfox
Follow
Dec 16 '24
Complete Data Protection Guide: Backing Up Proxmox Virtual Machines
#
dataprotection
#
proxmox
#
virtualmachines
1
 reaction
Comments
Add Comment
3 min read
Building Secure APIs: Best Practices for Data Protection
Obinna
Obinna
Obinna
Follow
Nov 4 '24
Building Secure APIs: Best Practices for Data Protection
#
apisecurity
#
dataprotection
#
backenddevelopment
#
cybersecurity
1
 reaction
Comments
Add Comment
4 min read
The Importance of Web Application Firewall defending against Cyber Threats.
Anupriya
Anupriya
Anupriya
Follow
Oct 23 '24
The Importance of Web Application Firewall defending against Cyber Threats.
#
waf
#
cybersecurity
#
applicationsecurity
#
dataprotection
Comments
Add Comment
2 min read
OAuth and OpenID Connect: Protecting User Authentication Properly
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 11 '24
OAuth and OpenID Connect: Protecting User Authentication Properly
#
websecurity
#
cybersecurity
#
webdev
#
dataprotection
Comments
Add Comment
4 min read
Difference Between Encryption and Hashing đđ
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Nov 8 '24
Difference Between Encryption and Hashing đđ
#
cybersecurity
#
dataprotection
#
encryption
#
hashing
2
 reactions
Comments
Add Comment
2 min read
Data Protection in the Digital Age
Gamika Punsisi
Gamika Punsisi
Gamika Punsisi
Follow
Oct 1 '24
Data Protection in the Digital Age
#
dataprotection
#
privacy
#
cybersecurity
Comments
Add Comment
6 min read
Secure Coding Practices to Protect Your Code in the Digital Era
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 14 '24
Secure Coding Practices to Protect Your Code in the Digital Era
#
cybersecurity
#
webdev
#
dataprotection
#
securecoding
1
 reaction
Comments
Add Comment
5 min read
Understanding SQL Injection: A Critical Security Vulnerabilityđâ ď¸đĄď¸
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Aug 31 '24
Understanding SQL Injection: A Critical Security Vulnerabilityđâ ď¸đĄď¸
#
sqlinjection
#
websecurity
#
cybersecurity
#
dataprotection
Comments
Add Comment
2 min read
Data Privacy in 2024: Innovations, Regulations, and Best Practices
Digital Samba
Digital Samba
Digital Samba
Follow
Jul 25 '24
Data Privacy in 2024: Innovations, Regulations, and Best Practices
#
dataprivacy
#
dataprotection
#
ai
#
webdev
1
 reaction
Comments
Add Comment
8 min read
Effortless VM Data Security with NAKIVO and Proxmox Backup
Jeffrey Boyle
Jeffrey Boyle
Jeffrey Boyle
Follow
Jun 20 '24
Effortless VM Data Security with NAKIVO and Proxmox Backup
#
vmbackup
#
dataprotection
#
nakivo
#
proxmox
Comments
Add Comment
2 min read
The Basics of Big Data: What You Need to Know
bvanderbilt0033
bvanderbilt0033
bvanderbilt0033
Follow
Jun 7 '24
The Basics of Big Data: What You Need to Know
#
dataprotection
#
dataanalytics
#
dataprivacy
#
bigdata
Comments
Add Comment
3 min read
The Ultimate Guide to Building a Secure Cloud Infrastructure
Jeffrey Boyle
Jeffrey Boyle
Jeffrey Boyle
Follow
Jun 28 '24
The Ultimate Guide to Building a Secure Cloud Infrastructure
#
cloudsecurity
#
dataprotection
#
cybersecurity
#
securecloud
1
 reaction
Comments
Add Comment
3 min read
Top 9 Security Tips for Safe Email Marketing
jchristopher0033
jchristopher0033
jchristopher0033
Follow
May 22 '24
Top 9 Security Tips for Safe Email Marketing
#
emailsecurity
#
dataprotection
#
cybersecurity
#
emailmarketing
Comments
Add Comment
2 min read
Information Classification in Microsoft Purview: A Step-by-Step Guide
Boris Gigovic
Boris Gigovic
Boris Gigovic
Follow
Jun 17 '24
Information Classification in Microsoft Purview: A Step-by-Step Guide
#
informationgovernance
#
informationsecurity
#
datasecurity
#
dataprotection
8
 reactions
Comments
Add Comment
5 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account