DEV Community

# dataprotection

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Secure Your MySQL Database: Best Practices for Data Protection

How to Secure Your MySQL Database: Best Practices for Data Protection

Comments
5 min read
Complete Data Protection Guide: Backing Up Proxmox Virtual Machines

Complete Data Protection Guide: Backing Up Proxmox Virtual Machines

Comments
3 min read
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data

Vulnerability Remediation: The Key to Safeguarding Your Systems and Data

Comments
3 min read
Comprehensive Data Protection in Kubernetes: Strategies for Securing Sensitive Information and Ensuring Resilience

Comprehensive Data Protection in Kubernetes: Strategies for Securing Sensitive Information and Ensuring Resilience

Comments
7 min read
Vishing Scams Explained: What They Are and How to Stay Safe

Vishing Scams Explained: What They Are and How to Stay Safe

Comments
4 min read
Building Secure APIs: Best Practices for Data Protection

Building Secure APIs: Best Practices for Data Protection

1
Comments
4 min read
The Importance of Web Application Firewall defending against Cyber Threats.

The Importance of Web Application Firewall defending against Cyber Threats.

Comments
2 min read
OAuth and OpenID Connect: Protecting User Authentication Properly

OAuth and OpenID Connect: Protecting User Authentication Properly

Comments
4 min read
Difference Between Encryption and Hashing 🔐🔑

Difference Between Encryption and Hashing 🔐🔑

2
Comments
2 min read
Data Protection in the Digital Age

Data Protection in the Digital Age

Comments
6 min read
Secure Coding Practices to Protect Your Code in the Digital Era

Secure Coding Practices to Protect Your Code in the Digital Era

1
Comments
5 min read
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️

Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️

Comments
2 min read
Data Privacy in 2024: Innovations, Regulations, and Best Practices

Data Privacy in 2024: Innovations, Regulations, and Best Practices

1
Comments
8 min read
Effortless VM Data Security with NAKIVO and Proxmox Backup

Effortless VM Data Security with NAKIVO and Proxmox Backup

Comments
2 min read
The Basics of Big Data: What You Need to Know

The Basics of Big Data: What You Need to Know

Comments
3 min read
The Ultimate Guide to Building a Secure Cloud Infrastructure

The Ultimate Guide to Building a Secure Cloud Infrastructure

1
Comments
3 min read
Top 9 Security Tips for Safe Email Marketing

Top 9 Security Tips for Safe Email Marketing

Comments
2 min read
Information Classification in Microsoft Purview: A Step-by-Step Guide

Information Classification in Microsoft Purview: A Step-by-Step Guide

7
Comments
5 min read
How to Protect Business and Employee Information: Top 5 Tips

How to Protect Business and Employee Information: Top 5 Tips

1
Comments
3 min read
2024 Guide: Advanced Backup Strategies for Nutanix to Protect Your Data

2024 Guide: Advanced Backup Strategies for Nutanix to Protect Your Data

Comments
3 min read
RAID Nedir? Nerelerde KullanÄąlÄąr?

RAID Nedir? Nerelerde KullanÄąlÄąr?

15
Comments 2
9 min read
Step-by-Step Guide to Backing Up an SQL Database

Step-by-Step Guide to Backing Up an SQL Database

1
Comments
2 min read
Deciphering the Digital Fortress: Next-Gen Data Security in 2024

Deciphering the Digital Fortress: Next-Gen Data Security in 2024

5
Comments
3 min read
Mastering Cybersecurity: Moving Beyond Common Mistakes

Mastering Cybersecurity: Moving Beyond Common Mistakes

Comments
2 min read
Safeguarding Your Digital Environment: VM Backup Techniques

Safeguarding Your Digital Environment: VM Backup Techniques

Comments
3 min read
Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 1

Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 1

3
Comments
5 min read
Future-Proof Your Data: Best Enterprise Backup Solutions for 2023

Future-Proof Your Data: Best Enterprise Backup Solutions for 2023

Comments
2 min read
Finding the Perfect SMB Data Protection Strategy

Finding the Perfect SMB Data Protection Strategy

Comments 1
3 min read
The Definitive Resource on Office 365 Backup Strategies

The Definitive Resource on Office 365 Backup Strategies

Comments
2 min read
Why File Backup is Your Best Defense Against Data Loss

Why File Backup is Your Best Defense Against Data Loss

Comments
3 min read
Hybrid Cloud Backup Demystified: Core Principles and Profitable Outcomes

Hybrid Cloud Backup Demystified: Core Principles and Profitable Outcomes

Comments
2 min read
A playground to practice differential privacy - Antigranular

A playground to practice differential privacy - Antigranular

Comments
6 min read
Hubstaff Enhances Remote Productivity and Facilitates Growth for Top Security and Backup Solutions Provider

Hubstaff Enhances Remote Productivity and Facilitates Growth for Top Security and Backup Solutions Provider

Comments
3 min read
Customer Data Protection in GDPR-Compliant Marketing: Best Practices

Customer Data Protection in GDPR-Compliant Marketing: Best Practices

16
Comments
3 min read
Security Advice for Virtualization: Protecting Information and Programs

Security Advice for Virtualization: Protecting Information and Programs

Comments
3 min read
Staying Ahead in the Cybersecurity Race: Tips & Strategies

Staying Ahead in the Cybersecurity Race: Tips & Strategies

Comments
4 min read
Monitor and protect sensitive log data with CloudWatch and Terraform

Monitor and protect sensitive log data with CloudWatch and Terraform

17
Comments
3 min read
Data Tokenization in Snowflake

Data Tokenization in Snowflake

1
Comments
9 min read
What is the best way to prepare for the SC-400 Exam?

What is the best way to prepare for the SC-400 Exam?

3
Comments 2
2 min read
Go Build in the Cloud Pt2

Go Build in the Cloud Pt2

5
Comments 1
1 min read
Privacy & Personalization

Privacy & Personalization

4
Comments
1 min read
Proteção de Dados

Proteção de Dados

3
Comments
3 min read
Zoombombing — a case study of data protection

Zoombombing — a case study of data protection

15
Comments
8 min read
How Secure Are Encryption, Hashing, Encoding and Obfuscation?

How Secure Are Encryption, Hashing, Encoding and Obfuscation?

7
Comments
2 min read
Practical Privacy: A Guide for Everyone

Practical Privacy: A Guide for Everyone

8
Comments
1 min read
10 best practices to protect your users’ data (and why they’re still not sufficient)

10 best practices to protect your users’ data (and why they’re still not sufficient)

57
Comments 7
5 min read
Encrypting your users’ data is no longer optional

Encrypting your users’ data is no longer optional

42
Comments 2
6 min read
AWS S3 Bucket Policy Gone Wrong

AWS S3 Bucket Policy Gone Wrong

4
Comments
2 min read
4 Reasons Why Blockchain Is Better At Protecting Information

4 Reasons Why Blockchain Is Better At Protecting Information

9
Comments
1 min read
How To Get Prepared For The 2018 GDPR Deadline?

How To Get Prepared For The 2018 GDPR Deadline?

6
Comments
2 min read
Best Tips To Help You Prepare GDPR For Data Protection

Best Tips To Help You Prepare GDPR For Data Protection

7
Comments
3 min read
loading...