DEV Community 👩‍💻👨‍💻

DEV Community 👩‍💻👨‍💻 is a community of 968,547 amazing developers

We're a place where coders share, stay up-to-date and grow their careers.

Create account Log in
yayabobi profile picture

yayabobi

404 bio not found

Joined Joined on  twitter website
The Developer’s Checklist to Security Hardening [XLS Download]

The Developer’s Checklist to Security Hardening [XLS Download]

Comments
8 min read
The ABCs of Identity & Access Management

The ABCs of Identity & Access Management

Reactions 3 Comments
6 min read
Top 10 Continuous Security Monitoring (CSM) Tools for 2023

Top 10 Continuous Security Monitoring (CSM) Tools for 2023

Reactions 2 Comments
9 min read
Real-Time Fraud Detection: 4 Methods to Protect your Online Shoppers

Real-Time Fraud Detection: 4 Methods to Protect your Online Shoppers

Comments
6 min read
How to Automate the Software Bill of Materials (SBOM)

How to Automate the Software Bill of Materials (SBOM)

Reactions 1 Comments
7 min read
5 ways to limit your exposure to the new critical OpenSSL vulnerability

5 ways to limit your exposure to the new critical OpenSSL vulnerability

Reactions 1 Comments
4 min read
Top 7 IoT Cyber Security Vulnerabilities for 2022

Top 7 IoT Cyber Security Vulnerabilities for 2022

Reactions 3 Comments
7 min read
The Essential SDLC Security Checklist

The Essential SDLC Security Checklist

Reactions 1 Comments
8 min read
5 Ways to Prevent Secrets Sprawl

5 Ways to Prevent Secrets Sprawl

Reactions 1 Comments
4 min read
5 Ways SDLC Security has Changed in 2022

5 Ways SDLC Security has Changed in 2022

Comments
6 min read
Top 5 Debugging Tips for Kubernetes DaemonSet

Top 5 Debugging Tips for Kubernetes DaemonSet

Reactions 1 Comments
5 min read
Your Guide to MITRE ATT&CK Framework

Your Guide to MITRE ATT&CK Framework

Reactions 3 Comments
5 min read
Top 5 Most Common API Vulnerabilities You Should Know About

Top 5 Most Common API Vulnerabilities You Should Know About

Reactions 2 Comments
6 min read
Top 10 Software Deployment Tools for 2022

Top 10 Software Deployment Tools for 2022

Reactions 6 Comments
11 min read
8 Data Security Best Practices for SaaS Applications

8 Data Security Best Practices for SaaS Applications

Reactions 2 Comments
7 min read
8 Types of Ransomware Attacks

8 Types of Ransomware Attacks

Reactions 3 Comments
6 min read
Cloud Data Security: Challenges and Best Practices

Cloud Data Security: Challenges and Best Practices

Reactions 6 Comments
7 min read
The Top 9 TPRM Solutions of 2022

The Top 9 TPRM Solutions of 2022

Reactions 4 Comments
9 min read
OpenTracing vs. OpenTelemetry

OpenTracing vs. OpenTelemetry

Reactions 4 Comments
5 min read
The 4 Types of NoSQL Databases You Need to Know

The 4 Types of NoSQL Databases You Need to Know

Reactions 2 Comments
6 min read
Top 8 IntelliJ Debug Shortcuts

Top 8 IntelliJ Debug Shortcuts

Reactions 4 Comments
6 min read
How to use VSCode to debug a Node.js application

How to use VSCode to debug a Node.js application

Reactions 11 Comments
7 min read
5 Tips for Elasticsearch Cost Optimization

5 Tips for Elasticsearch Cost Optimization

Reactions 5 Comments
9 min read
5 Reasons Why Voice Ordering is the Future of Fast Food Dining

5 Reasons Why Voice Ordering is the Future of Fast Food Dining

Comments
6 min read
What is a Data Subject Access Request (DSAR) And Why You Should Care?

What is a Data Subject Access Request (DSAR) And Why You Should Care?

Reactions 3 Comments
5 min read
8 Best Content Security Policies for 2022

8 Best Content Security Policies for 2022

Reactions 6 Comments
6 min read
The Essential PCI Compliance Checklist

The Essential PCI Compliance Checklist

Reactions 3 Comments 1
7 min read
Top 15 Best GRC (Governance, Risk, and Compliance) Tools

Top 15 Best GRC (Governance, Risk, and Compliance) Tools

Reactions 3 Comments
9 min read
A Step-by-step Guide to Preventing Tailgating Attacks

A Step-by-step Guide to Preventing Tailgating Attacks

Reactions 5 Comments
6 min read
The Complete API Security Checklist

The Complete API Security Checklist

Comments
6 min read
How to Analyze the OWASP Dependency-Check?

How to Analyze the OWASP Dependency-Check?

Comments
7 min read
The Roles and Responsibilities of a Data Protection Officer

The Roles and Responsibilities of a Data Protection Officer

Reactions 2 Comments
6 min read
How to perform software composition analysis?

How to perform software composition analysis?

Reactions 1 Comments
7 min read
Using Lumigo to debug AWS Lambda timeouts

Using Lumigo to debug AWS Lambda timeouts

Reactions 2 Comments
4 min read
The Debugger Checklist – Part I

The Debugger Checklist – Part I

Reactions 5 Comments
5 min read
Understanding Stack Traces and Debugging them Further

Understanding Stack Traces and Debugging them Further

Reactions 6 Comments
10 min read
11 Top DevSecOps Tools

11 Top DevSecOps Tools

Reactions 3 Comments
7 min read
8 Fundamental Steps to Secure Cloud Data

8 Fundamental Steps to Secure Cloud Data

Reactions 1 Comments
9 min read
Top 5 Can’t-Miss Cybersecurity Awareness Tips

Top 5 Can’t-Miss Cybersecurity Awareness Tips

Reactions 1 Comments
3 min read
DevSecOps Cloud Security Solutions Buyer’s Guide

DevSecOps Cloud Security Solutions Buyer’s Guide

Reactions 3 Comments
9 min read
Visual Chatbots and B2B: What You Need to Know

Visual Chatbots and B2B: What You Need to Know

Reactions 1 Comments
7 min read
The Essential Guide to Dependency Graphs

The Essential Guide to Dependency Graphs

Comments
4 min read
Debugging in Production – How to move fast without breaking things

Debugging in Production – How to move fast without breaking things

Reactions 1 Comments
8 min read
Top 12 Cloud Security Tools for 2021

Top 12 Cloud Security Tools for 2021

Reactions 4 Comments
10 min read
Kotlin vs Java: 10 Years In

Kotlin vs Java: 10 Years In

Reactions 12 Comments 1
6 min read
The 9 most common MSSP security services

The 9 most common MSSP security services

Comments
6 min read
Top 5 Java Linters

Top 5 Java Linters

Reactions 1 Comments
4 min read
loading...