DEV Community

yayabobi profile picture

yayabobi

404 bio not found

Joined Joined on  twitter website
IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

1
Comments
6 min read
Serverless Security Best Practices

Serverless Security Best Practices

1
Comments
9 min read
7 Reasons to Adopt a Distributed Cloud Infrastructure

7 Reasons to Adopt a Distributed Cloud Infrastructure

Comments
8 min read
5 Steps to Building a Robust Cyber Resilience Framework

5 Steps to Building a Robust Cyber Resilience Framework

Comments
8 min read
4 Tips to Improve P99 Latency

4 Tips to Improve P99 Latency

Comments
7 min read
A Step-by-Step Guide to Creating a Data Security Policy

A Step-by-Step Guide to Creating a Data Security Policy

1
Comments 1
6 min read
The Developer's Guide to OWASP API Security

The Developer's Guide to OWASP API Security

1
Comments
9 min read
14 Cybersecurity Awareness Topics You Need to Cover

14 Cybersecurity Awareness Topics You Need to Cover

Comments
7 min read
7 Essential SaaS Security Best Practices

7 Essential SaaS Security Best Practices

1
Comments
7 min read
What is Identity Governance: 5 Steps to Build Your Framework

What is Identity Governance: 5 Steps to Build Your Framework

Comments
6 min read
HIPAA and Privacy Act Training Challenge Exam [XLS download]

HIPAA and Privacy Act Training Challenge Exam [XLS download]

Comments
8 min read
A Step-by-Step Guide to Creating an AWS IAM Policy Document

A Step-by-Step Guide to Creating an AWS IAM Policy Document

1
Comments
6 min read
The Essential Guide to Internal Developer Platforms

The Essential Guide to Internal Developer Platforms

Comments
7 min read
What is API Discovery, and How to Use it to Reduce Your Attack Surface

What is API Discovery, and How to Use it to Reduce Your Attack Surface

Comments
8 min read
Top 10 Digital Risk Protection Software Solutions

Top 10 Digital Risk Protection Software Solutions

1
Comments
10 min read
Top 11 Website Security Software Solutions for 2024

Top 11 Website Security Software Solutions for 2024

Comments
10 min read
What is the DevSecOps Maturity Model (DSOMM)?

What is the DevSecOps Maturity Model (DSOMM)?

Comments
7 min read
Top 7 Web Application Security Tools

Top 7 Web Application Security Tools

1
Comments
8 min read
The Complete Guide to Passing an ISO 27001 Audit

The Complete Guide to Passing an ISO 27001 Audit

1
Comments
9 min read
5 Card Skimming Methods Every Infosec Pro Needs to Know

5 Card Skimming Methods Every Infosec Pro Needs to Know

Comments
6 min read
Threat Detection and Response (TDR): What is it and Do You Need it?

Threat Detection and Response (TDR): What is it and Do You Need it?

Comments
5 min read
Threat Detection and Response (TDR): What is it and Do You Need it?

Threat Detection and Response (TDR): What is it and Do You Need it?

Comments
5 min read
The Essential Guide to SaaS Compliance

The Essential Guide to SaaS Compliance

Comments
6 min read
IAM Vs PAM: What Is The Difference?

IAM Vs PAM: What Is The Difference?

Comments
7 min read
21 Ecommerce Fraud Protection Policies to Implement Now

21 Ecommerce Fraud Protection Policies to Implement Now

Comments
6 min read
The Complete kubectl Cheat Sheet

The Complete kubectl Cheat Sheet

Comments
7 min read
7 Top Strategies for Effective Bot Detection Revealed

7 Top Strategies for Effective Bot Detection Revealed

Comments
9 min read
SaaS Data Security: 7 Tips to Keep Your SaaS Data Secure

SaaS Data Security: 7 Tips to Keep Your SaaS Data Secure

2
Comments
7 min read
Text4Shell Decoded: Why This Vulnerability is a Cybersecurity Plot Twist

Text4Shell Decoded: Why This Vulnerability is a Cybersecurity Plot Twist

Comments
6 min read
Understanding SaaS vs Self-hosted: What are the Differences and Benefits of Each?

Understanding SaaS vs Self-hosted: What are the Differences and Benefits of Each?

2
Comments
7 min read
The Complete Guide to SaaS Security

The Complete Guide to SaaS Security

Comments
12 min read
The Human Firewall: Your Guide to a Security Culture

The Human Firewall: Your Guide to a Security Culture

Comments
7 min read
5 Most Common Security Misconfiguration Vulnerabilities and Their Mitigation

5 Most Common Security Misconfiguration Vulnerabilities and Their Mitigation

1
Comments
6 min read
Top 10 CIAM Software Solutions

Top 10 CIAM Software Solutions

1
Comments
10 min read
5 Most Common Security Misconfiguration Vulnerabilities and Their Mitigation

5 Most Common Security Misconfiguration Vulnerabilities and Their Mitigation

Comments
6 min read
OWASP Clickjacking: The Enhanced Cheat Sheet [XLS DOWNLOAD]

OWASP Clickjacking: The Enhanced Cheat Sheet [XLS DOWNLOAD]

Comments
6 min read
5 Most Common Security Misconfiguration Vulnerabilities and Their Mitigation

5 Most Common Security Misconfiguration Vulnerabilities and Their Mitigation

2
Comments
6 min read
7 Tips To Make Sense Of The Gartner IAM Magic Quadrant

7 Tips To Make Sense Of The Gartner IAM Magic Quadrant

Comments 1
7 min read
What is SSPM? 7 Building Blocks of SaaS Security Posture Management

What is SSPM? 7 Building Blocks of SaaS Security Posture Management

Comments
7 min read
The InfoSec Guide to HIPAA Compliance

The InfoSec Guide to HIPAA Compliance

Comments
10 min read
Kubernetes multi-tenancy: 5 things to avoid in your architecture

Kubernetes multi-tenancy: 5 things to avoid in your architecture

Comments
6 min read
5 Simple Steps to Master Terraform IaM Roles

5 Simple Steps to Master Terraform IaM Roles

Comments
7 min read
Okta Logs Decoded: Unveiling Identity Threats Through Threat Hunting

Okta Logs Decoded: Unveiling Identity Threats Through Threat Hunting

1
Comments
13 min read
Edge Computing in IoT: 7 Reasons to Take IoT to the Edge

Edge Computing in IoT: 7 Reasons to Take IoT to the Edge

Comments
8 min read
The InfoSec Guide to the Principles of Zero Trust

The InfoSec Guide to the Principles of Zero Trust

Comments
12 min read
7 Expert Tips for Optimizing AWS WAF Pricing

7 Expert Tips for Optimizing AWS WAF Pricing

Comments
6 min read
What is the Digital Operations and Resilience Act (DORA)?

What is the Digital Operations and Resilience Act (DORA)?

Comments 1
12 min read
14 Expert Tips to Effectively Manage Cloud Costs

14 Expert Tips to Effectively Manage Cloud Costs

Comments
6 min read
Top 10 Best WAF Solutions

Top 10 Best WAF Solutions

Comments
10 min read
10 IAM Best Practices For 2023

10 IAM Best Practices For 2023

Comments
7 min read
Top 10 Snyk Alternatives for Code Security

Top 10 Snyk Alternatives for Code Security

1
Comments
8 min read
The Ultimate Guide to Cyber Resilience

The Ultimate Guide to Cyber Resilience

Comments
9 min read
The Complete Guide to Smishing (SMS Phishing)

The Complete Guide to Smishing (SMS Phishing)

Comments
9 min read
AWS FTR (Foundational Technical Review) Checklist [XLS Download]

AWS FTR (Foundational Technical Review) Checklist [XLS Download]

Comments
5 min read
Top 10 Data Discovery Tools by Type

Top 10 Data Discovery Tools by Type

Comments
7 min read
A Step-by-Step Guide to a Cloud Migration Strategy that Saves Your Money

A Step-by-Step Guide to a Cloud Migration Strategy that Saves Your Money

Comments
6 min read
A Step-by-Step Guide to Cloud Identity Management

A Step-by-Step Guide to Cloud Identity Management

Comments
7 min read
The Comprehensive Guide to Fraud Detection, Management, and Analysis

The Comprehensive Guide to Fraud Detection, Management, and Analysis

Comments 1
12 min read
Top 7 Requirements for Successful Attack Surface Management

Top 7 Requirements for Successful Attack Surface Management

Comments
8 min read
3 Data Observability Tools

3 Data Observability Tools

Comments
3 min read
loading...