Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
dataprotection
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Complete Data Protection Guide: Backing Up Proxmox Virtual Machines
iamjoelfox
iamjoelfox
iamjoelfox
Follow
Dec 16
Complete Data Protection Guide: Backing Up Proxmox Virtual Machines
#
dataprotection
#
proxmox
#
virtualmachines
Comments
Add Comment
3 min read
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data
Anupriya
Anupriya
Anupriya
Follow
Dec 10
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data
#
vulnerabilityremediation
#
cybersecurity
#
dataprotection
#
informationsecurity
Comments
Add Comment
3 min read
Comprehensive Data Protection in Kubernetes: Strategies for Securing Sensitive Information and Ensuring Resilience
Raza Shaikh
Raza Shaikh
Raza Shaikh
Follow
Nov 29
Comprehensive Data Protection in Kubernetes: Strategies for Securing Sensitive Information and Ensuring Resilience
#
kubernetes
#
dataprotection
Comments
Add Comment
7 min read
Vishing Scams Explained: What They Are and How to Stay Safe
Anupriya
Anupriya
Anupriya
Follow
Nov 18
Vishing Scams Explained: What They Are and How to Stay Safe
#
vishingscams
#
cybersecurity
#
dataprotection
#
secureinformation
Comments
Add Comment
4 min read
Building Secure APIs: Best Practices for Data Protection
Obinna
Obinna
Obinna
Follow
Nov 4
Building Secure APIs: Best Practices for Data Protection
#
apisecurity
#
dataprotection
#
backenddevelopment
#
cybersecurity
1
 reaction
Comments
Add Comment
4 min read
The Importance of Web Application Firewall defending against Cyber Threats.
Anupriya
Anupriya
Anupriya
Follow
Oct 23
The Importance of Web Application Firewall defending against Cyber Threats.
#
waf
#
cybersecurity
#
applicationsecurity
#
dataprotection
Comments
Add Comment
2 min read
OAuth and OpenID Connect: Protecting User Authentication Properly
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 11
OAuth and OpenID Connect: Protecting User Authentication Properly
#
websecurity
#
cybersecurity
#
webdev
#
dataprotection
Comments
Add Comment
4 min read
Difference Between Encryption and Hashing đđ
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Nov 8
Difference Between Encryption and Hashing đđ
#
cybersecurity
#
dataprotection
#
encryption
#
hashing
2
 reactions
Comments
Add Comment
2 min read
Data Protection in the Digital Age
Gamika Punsisi
Gamika Punsisi
Gamika Punsisi
Follow
Oct 1
Data Protection in the Digital Age
#
dataprotection
#
privacy
#
cybersecurity
Comments
Add Comment
6 min read
Secure Coding Practices to Protect Your Code in the Digital Era
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 14
Secure Coding Practices to Protect Your Code in the Digital Era
#
cybersecurity
#
webdev
#
dataprotection
#
securecoding
1
 reaction
Comments
Add Comment
5 min read
Understanding SQL Injection: A Critical Security Vulnerabilityđâ ď¸đĄď¸
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Aug 31
Understanding SQL Injection: A Critical Security Vulnerabilityđâ ď¸đĄď¸
#
sqlinjection
#
websecurity
#
cybersecurity
#
dataprotection
Comments
Add Comment
2 min read
Data Privacy in 2024: Innovations, Regulations, and Best Practices
Digital Samba
Digital Samba
Digital Samba
Follow
Jul 25
Data Privacy in 2024: Innovations, Regulations, and Best Practices
#
dataprivacy
#
dataprotection
#
ai
#
webdev
1
 reaction
Comments
Add Comment
8 min read
Effortless VM Data Security with NAKIVO and Proxmox Backup
Jeffrey Boyle
Jeffrey Boyle
Jeffrey Boyle
Follow
Jun 20
Effortless VM Data Security with NAKIVO and Proxmox Backup
#
vmbackup
#
dataprotection
#
nakivo
#
proxmox
Comments
Add Comment
2 min read
The Basics of Big Data: What You Need to Know
bvanderbilt0033
bvanderbilt0033
bvanderbilt0033
Follow
Jun 7
The Basics of Big Data: What You Need to Know
#
dataprotection
#
dataanalytics
#
dataprivacy
#
bigdata
Comments
Add Comment
3 min read
The Ultimate Guide to Building a Secure Cloud Infrastructure
Jeffrey Boyle
Jeffrey Boyle
Jeffrey Boyle
Follow
Jun 28
The Ultimate Guide to Building a Secure Cloud Infrastructure
#
cloudsecurity
#
dataprotection
#
cybersecurity
#
securecloud
1
 reaction
Comments
Add Comment
3 min read
Top 9 Security Tips for Safe Email Marketing
jchristopher0033
jchristopher0033
jchristopher0033
Follow
May 22
Top 9 Security Tips for Safe Email Marketing
#
emailsecurity
#
dataprotection
#
cybersecurity
#
emailmarketing
Comments
Add Comment
2 min read
Information Classification in Microsoft Purview: A Step-by-Step Guide
Boris Gigovic
Boris Gigovic
Boris Gigovic
Follow
Jun 17
Information Classification in Microsoft Purview: A Step-by-Step Guide
#
informationgovernance
#
informationsecurity
#
datasecurity
#
dataprotection
7
 reactions
Comments
Add Comment
5 min read
How to Protect Business and Employee Information: Top 5 Tips
bocruz0033
bocruz0033
bocruz0033
Follow
Jun 11
How to Protect Business and Employee Information: Top 5 Tips
#
businesssecurity
#
dataprotection
#
cybersecurity
1
 reaction
Comments
Add Comment
3 min read
2024 Guide: Advanced Backup Strategies for Nutanix to Protect Your Data
Caesar Howter
Caesar Howter
Caesar Howter
Follow
Apr 26
2024 Guide: Advanced Backup Strategies for Nutanix to Protect Your Data
#
backupstrategies
#
nutanix
#
dataprotection
#
disasterrecovery
Comments
Add Comment
3 min read
RAID Nedir? Nerelerde KullanÄąlÄąr?
Ece Meryem Kocaman
Ece Meryem Kocaman
Ece Meryem Kocaman
Follow
for
Teknik Bilimler Meslek YĂźksekokulu
May 28
RAID Nedir? Nerelerde KullanÄąlÄąr?
#
raid
#
datastorage
#
dataprotection
#
disk
15
 reactions
Comments
2
 comments
9 min read
Step-by-Step Guide to Backing Up an SQL Database
Caesar Howter
Caesar Howter
Caesar Howter
Follow
Apr 30
Step-by-Step Guide to Backing Up an SQL Database
#
sqldatabase
#
backupstrategies
#
dataprotection
1
 reaction
Comments
Add Comment
2 min read
Deciphering the Digital Fortress: Next-Gen Data Security in 2024
Enzo Garcia
Enzo Garcia
Enzo Garcia
Follow
Apr 16
Deciphering the Digital Fortress: Next-Gen Data Security in 2024
#
dataprotection
#
cybersecurity
#
threatdetection
#
advancedencryption
5
 reactions
Comments
Add Comment
3 min read
Mastering Cybersecurity: Moving Beyond Common Mistakes
Andre Ronan
Andre Ronan
Andre Ronan
Follow
Feb 20
Mastering Cybersecurity: Moving Beyond Common Mistakes
#
cybersecurity
#
dataprotection
#
threatdetection
Comments
Add Comment
2 min read
Safeguarding Your Digital Environment: VM Backup Techniques
Daniel Caesar
Daniel Caesar
Daniel Caesar
Follow
Mar 15
Safeguarding Your Digital Environment: VM Backup Techniques
#
virtualmachines
#
dataintegrity
#
dataprotection
Comments
Add Comment
3 min read
Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 1
Mostefa Brougui
Mostefa Brougui
Mostefa Brougui
Follow
for
AWS Community Builders
Mar 8
Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 1
#
aws
#
spark
#
encryption
#
dataprotection
3
 reactions
Comments
Add Comment
5 min read
Future-Proof Your Data: Best Enterprise Backup Solutions for 2023
Daniel Caesar
Daniel Caesar
Daniel Caesar
Follow
Mar 6
Future-Proof Your Data: Best Enterprise Backup Solutions for 2023
#
clouddatamanagement
#
dataprotection
#
enterprisebackup
Comments
Add Comment
2 min read
Finding the Perfect SMB Data Protection Strategy
Cam Whitmore
Cam Whitmore
Cam Whitmore
Follow
Feb 16
Finding the Perfect SMB Data Protection Strategy
#
dataprotection
#
backupsolution
#
businesscontinuity
Comments
1
 comment
3 min read
The Definitive Resource on Office 365 Backup Strategies
Cam Whitmore
Cam Whitmore
Cam Whitmore
Follow
Feb 16
The Definitive Resource on Office 365 Backup Strategies
#
office365backup
#
dataprotection
#
backupstrategy
Comments
Add Comment
2 min read
Why File Backup is Your Best Defense Against Data Loss
Donnie Alonte
Donnie Alonte
Donnie Alonte
Follow
Feb 16
Why File Backup is Your Best Defense Against Data Loss
#
dataprotection
#
backupstrategies
#
cybersecurity
Comments
Add Comment
3 min read
Hybrid Cloud Backup Demystified: Core Principles and Profitable Outcomes
Andre Ronan
Andre Ronan
Andre Ronan
Follow
Feb 14
Hybrid Cloud Backup Demystified: Core Principles and Profitable Outcomes
#
dataprotection
#
hybridcloud
#
disasterrecovery
Comments
Add Comment
2 min read
A playground to practice differential privacy - Antigranular
Richard Fan
Richard Fan
Richard Fan
Follow
Dec 26 '23
A playground to practice differential privacy - Antigranular
#
cloudsecurity
#
dataprivacy
#
dataprotection
Comments
Add Comment
6 min read
Hubstaff Enhances Remote Productivity and Facilitates Growth for Top Security and Backup Solutions Provider
Vernon Miller
Vernon Miller
Vernon Miller
Follow
Nov 27 '23
Hubstaff Enhances Remote Productivity and Facilitates Growth for Top Security and Backup Solutions Provider
#
dataprotection
#
datasecurity
#
databackup
Comments
Add Comment
3 min read
Customer Data Protection in GDPR-Compliant Marketing: Best Practices
Chris Bolick
Chris Bolick
Chris Bolick
Follow
Nov 14 '23
Customer Data Protection in GDPR-Compliant Marketing: Best Practices
#
dataprotection
#
gdpr
#
datacontrollers
#
dataprocessors
16
 reactions
Comments
Add Comment
3 min read
Security Advice for Virtualization: Protecting Information and Programs
Vernon Miller
Vernon Miller
Vernon Miller
Follow
Nov 1 '23
Security Advice for Virtualization: Protecting Information and Programs
#
dataprotection
#
cybersecurity
#
itinfrastructures
#
virtualmachine
Comments
Add Comment
3 min read
Staying Ahead in the Cybersecurity Race: Tips & Strategies
TechScope Blog
TechScope Blog
TechScope Blog
Follow
May 2 '23
Staying Ahead in the Cybersecurity Race: Tips & Strategies
#
cyberthreats
#
cybersecurity
#
dataprotection
#
experttips
Comments
Add Comment
4 min read
Monitor and protect sensitive log data with CloudWatch and Terraform
Natalia Marek
Natalia Marek
Natalia Marek
Follow
for
AWS Community Builders
Dec 2 '22
Monitor and protect sensitive log data with CloudWatch and Terraform
#
aws
#
cloudwatch
#
dataprotection
#
terraform
16
 reactions
Comments
Add Comment
3 min read
Data Tokenization in Snowflake
Narae
Narae
Narae
Follow
Aug 16 '22
Data Tokenization in Snowflake
#
sql
#
snowflake
#
dataprotection
#
tokenization
1
 reaction
Comments
Add Comment
9 min read
What is the best way to prepare for the SC-400 Exam?
MakendranG
MakendranG
MakendranG
Follow
Apr 27 '22
What is the best way to prepare for the SC-400 Exam?
#
informationprotection
#
azure
#
governance
#
dataprotection
3
 reactions
Comments
2
 comments
2 min read
Go Build in the Cloud Pt2
Gbemisola Esho
Gbemisola Esho
Gbemisola Esho
Follow
for
AWS Community Builders
Apr 1 '22
Go Build in the Cloud Pt2
#
security
#
identityandaccessmanagement
#
dataprotection
5
 reactions
Comments
1
 comment
1 min read
Privacy & Personalization
Manoj Shukla
Manoj Shukla
Manoj Shukla
Follow
Oct 23 '21
Privacy & Personalization
#
privacy
#
dataprotection
#
personalization
#
data
4
 reactions
Comments
Add Comment
1 min read
Proteção de Dados
Mariana Carvalho
Mariana Carvalho
Mariana Carvalho
Follow
for
Sysadminas
Aug 5 '20
Proteção de Dados
#
dataprotection
#
infraestrutura
#
womenintech
#
datacenter
3
 reactions
Comments
Add Comment
3 min read
Zoombombingâââa case study of data protection
Warren Parad
Warren Parad
Warren Parad
Follow
Jun 14 '20
Zoombombingâââa case study of data protection
#
security
#
dataprotection
#
productmanagement
#
architecture
15
 reactions
Comments
Add Comment
8 min read
How Secure Are Encryption, Hashing, Encoding and Obfuscation?
Bachi
Bachi
Bachi
Follow
for
Auth0
Aug 28 '19
How Secure Are Encryption, Hashing, Encoding and Obfuscation?
#
dataprotection
#
hashing
#
cybersecurity
7
 reactions
Comments
Add Comment
2 min read
Practical Privacy: A Guide for Everyone
Ramiro
Ramiro
Ramiro
Follow
for
Auth0
Jan 28 '19
Practical Privacy: A Guide for Everyone
#
infosec
#
dataprivacy
#
dataprotection
8
 reactions
Comments
Add Comment
1 min read
10 best practices to protect your usersâ data (and why theyâre still not sufficient)
Dimitri Merejkowsky
Dimitri Merejkowsky
Dimitri Merejkowsky
Follow
for
Tanker
Feb 5 '19
10 best practices to protect your usersâ data (and why theyâre still not sufficient)
#
privacy
#
encryption
#
dataprotection
#
security
57
 reactions
Comments
7
 comments
5 min read
Encrypting your usersâ data is no longer optional
Dimitri Merejkowsky
Dimitri Merejkowsky
Dimitri Merejkowsky
Follow
for
Tanker
Jan 22 '19
Encrypting your usersâ data is no longer optional
#
privacy
#
encryption
#
dataprotection
#
databreaches
42
 reactions
Comments
2
 comments
6 min read
AWS S3 Bucket Policy Gone Wrong
Totalcloud.io
Totalcloud.io
Totalcloud.io
Follow
Dec 14 '18
AWS S3 Bucket Policy Gone Wrong
#
aws
#
dataprotection
#
s3bucket
#
cloudsecurity
4
 reactions
Comments
Add Comment
2 min read
4 Reasons Why Blockchain Is Better At Protecting Information
Brett Clawson
Brett Clawson
Brett Clawson
Follow
Oct 15 '18
4 Reasons Why Blockchain Is Better At Protecting Information
#
blockchain
#
dataprotection
#
security
9
 reactions
Comments
Add Comment
1 min read
How To Get Prepared For The 2018 GDPR Deadline?
Martin Smith
Martin Smith
Martin Smith
Follow
Sep 7 '18
How To Get Prepared For The 2018 GDPR Deadline?
#
dataprotection
#
privacy
#
gdpr
#
security
6
 reactions
Comments
Add Comment
2 min read
Best Tips To Help You Prepare GDPR For Data Protection
Martin Smith
Martin Smith
Martin Smith
Follow
Sep 4 '18
Best Tips To Help You Prepare GDPR For Data Protection
#
gdpr
#
dataprotection
#
security
#
privacy
7
 reactions
Comments
Add Comment
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account