Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
dataprotection
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Essential Security Measures for Safeguarding Your System and Protecting User Data
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Jan 16 '25
Essential Security Measures for Safeguarding Your System and Protecting User Data
#
systems
#
systemsecurity
#
dataprotection
Comments
Add Comment
7 min read
How AWS Security Works: Protecting Your Cloud Infrastructure and Data
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 27 '24
How AWS Security Works: Protecting Your Cloud Infrastructure and Data
#
aws
#
cloudsecurity
#
dataprotection
#
awscloud
Comments
Add Comment
5 min read
The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Dec 26 '24
The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance
#
fintech
#
dataprotection
#
cybersecurity
#
compliance
Comments
Add Comment
2 min read
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data
Anupriya
Anupriya
Anupriya
Follow
Dec 10 '24
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data
#
vulnerabilityremediation
#
cybersecurity
#
dataprotection
#
informationsecurity
Comments
Add Comment
3 min read
2025 Cybersecurity Resolutions: How to Tackle Emerging Threats Before They Happen
Anupriya
Anupriya
Anupriya
Follow
Jan 9 '25
2025 Cybersecurity Resolutions: How to Tackle Emerging Threats Before They Happen
#
cybersecurity
#
resolutions2025
#
dataprotection
#
informationsecurity
Comments
1
comment
5 min read
Comprehensive Data Protection in Kubernetes: Strategies for Securing Sensitive Information and Ensuring Resilience
Raza Shaikh
Raza Shaikh
Raza Shaikh
Follow
Nov 29 '24
Comprehensive Data Protection in Kubernetes: Strategies for Securing Sensitive Information and Ensuring Resilience
#
kubernetes
#
dataprotection
Comments
Add Comment
7 min read
Vishing Scams Explained: What They Are and How to Stay Safe
Anupriya
Anupriya
Anupriya
Follow
Nov 18 '24
Vishing Scams Explained: What They Are and How to Stay Safe
#
vishingscams
#
cybersecurity
#
dataprotection
#
secureinformation
Comments
Add Comment
4 min read
How to Secure Your MySQL Database: Best Practices for Data Protection
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 20 '24
How to Secure Your MySQL Database: Best Practices for Data Protection
#
mysql
#
databasesecurity
#
dataprotection
#
sqlsecurity
Comments
Add Comment
5 min read
Complete Data Protection Guide: Backing Up Proxmox Virtual Machines
iamjoelfox
iamjoelfox
iamjoelfox
Follow
Dec 16 '24
Complete Data Protection Guide: Backing Up Proxmox Virtual Machines
#
dataprotection
#
proxmox
#
virtualmachines
2
reactions
Comments
Add Comment
3 min read
Building Secure APIs: Best Practices for Data Protection
Obinna
Obinna
Obinna
Follow
Nov 4 '24
Building Secure APIs: Best Practices for Data Protection
#
apisecurity
#
dataprotection
#
backenddevelopment
#
cybersecurity
1
reaction
Comments
Add Comment
4 min read
OAuth and OpenID Connect: Protecting User Authentication Properly
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 11 '24
OAuth and OpenID Connect: Protecting User Authentication Properly
#
websecurity
#
cybersecurity
#
webdev
#
dataprotection
Comments
Add Comment
4 min read
Difference Between Encryption and Hashing 🔐🔑
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Nov 8 '24
Difference Between Encryption and Hashing 🔐🔑
#
cybersecurity
#
dataprotection
#
encryption
#
hashing
2
reactions
Comments
Add Comment
2 min read
Data Protection in the Digital Age
Gamika Punsisi
Gamika Punsisi
Gamika Punsisi
Follow
Oct 1 '24
Data Protection in the Digital Age
#
dataprotection
#
privacy
#
cybersecurity
Comments
Add Comment
6 min read
Secure Coding Practices to Protect Your Code in the Digital Era
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 14 '24
Secure Coding Practices to Protect Your Code in the Digital Era
#
cybersecurity
#
webdev
#
dataprotection
#
securecoding
1
reaction
Comments
Add Comment
5 min read
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Aug 31 '24
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
#
sqlinjection
#
websecurity
#
cybersecurity
#
dataprotection
Comments
Add Comment
2 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account