Building a Secure Future: An Introduction to Zero Trust Security Post date January 23, 2023 Post author By Saeed Mohajeryami, PhD Post categories In cloud, data-security, zero-trust
What is a Distributed Storage Network on a Blockchain System? Post date December 8, 2021 Post author By Amelia Post categories In blockchain-technology, blockchainstorage, data-security, data-storage, decentralized-data-storage, decentralized-internet, distributed-storage, technology-trends
7 Serious Security Issues in Big Data and How to Address Them Post date December 8, 2021 Post author By Junaid Tariq Post categories In benefits-of-big-data, big-data, big-data-security, big-tech, data-privacy, data-security, security-issues-in-big-data, security-threats
The Two Best Ways To Scan For PII In Your Data Warehouse Post date December 5, 2021 Post author By Rajat Venkatesh Post categories In data-privacy, data-security, data-warehouse, database, personal-data, personal-data-security, pii-in-your-data-warehouse, programming
A Cryptographer’s Guide to End-to-End Encryption Post date November 23, 2021 Post author By Tresorit Post categories In cybercrime, cybersecurity, data-security, encryption, front-end developer, good-company, guide-to-end-to-end-encryption, security
Employ These 4 Simple Practices to Improve Company Data Security Post date November 15, 2021 Post author By newsletters Post categories In cybersecurity, data-science, data-security, encryption, hackernoon, newsletter, security, sensitive-data
The Centralized Internet is Broken Post date November 7, 2021 Post author By jmau111 Post categories In big-tech, centralized-internet, centralized-internet-is-broken, data-privacy, data-security, decentralization, decentralized-internet, privacy
Being ‘Chief Geek’ and Running 15 Websites with Noonies Nominee Mathias Hellquist Post date November 4, 2021 Post author By Mathias Hellquist Post categories In big-data, data-security, information-security, interview, noonies-nominees, noonies2021, privacy, vpn, web-monetization
5 Common Identity and Access Management Security Risks Post date November 4, 2021 Post author By Jessica Truong Post categories In access-management, blogging-fellowship, cybersecurity, data-safety, data-security, iam, identity-and-access-management, identity-management
How to Choose the Right Hyper-V Backup Strategy Post date November 3, 2021 Post author By VALERY M Post categories In backup, cybersecurity, data, data-privacy, data-security, hyper-v, hyper-v-backup, software-development
How to Ensure Data Integrity in an Organization Post date October 27, 2021 Post author By Jessica Truong Post categories In blogging-fellowship, cyber-threats, cybersecurity, data-integrity, data-integrity-in-organization, data-privacy, data-security, ensure-data-integrity
How to Scan Your Systems for Personal Data Post date October 26, 2021 Post author By Soveren Post categories In cybersecurity, data-analysis, data-privacy, data-security, good-company, personal-data, personal-data-across-systems, personal-data-security
Improving IoT Device Security Prevention from Zero-Day Attacks Post date October 2, 2021 Post author By Check Point Software Post categories In checkpoint, cyber-security, data-security, good-company, IoT, iot-device-security, iot-firmware-security, security
Apple vs Microsoft: Who Offers Better Security? Post date October 1, 2021 Post author By Jessica Truong Post categories In apple-m1, apple-security, blogging-fellowship, cybersecurity, data-security, device-security, hackernoon-top-story, microsoft-windows
How to Structure an Effective Digital Defense Team Post date September 30, 2021 Post author By Nick Shevelyov Post categories In build-digital-defence-team, cybercrime, cybersecurity, data-security, digital-defence, hackernoon-top-story, hacking, security
Password Security in 2021 — A Complete Guide Post date September 25, 2021 Post author By JDLT Post categories In cyber-security, data-security, good-company, hackernoon-top-story, password-security, password-security-in-2021, passwords, security
A Look at COVID’s Impact on Data Privacy and Protection Post date September 24, 2021 Post author By Shannon Post categories In coronavirus-impact-on-business, covid-19, covid-impact-on-data-privacy, data, data-security, personal-data, security, trends-in-cybersecurity
Fast Fourier Transform: Scaling Multi-Point Evaluation Post date September 18, 2021 Post author By Vitalik Buterin Post categories In blockchain, blockchain-security, data-security, fast-fourier-transform, fft, starks, vitalik-buterin, what-is-fast-fourier-transform
Network Security 101: Everything You Need to Know Post date September 7, 2021 Post author By Jessica Truong Post categories In blogging-fellowship, cybersecurity, data-security, hackernoon-top-story, network-security, network-security-basics, networking, security-basics
8 Cloud Compliance Frameworks and Why Cloud-based Organizations Need Them Post date August 26, 2021 Post author By Alex Jordan Post categories In business, cloud-computing, cloud-infrastructure, compliance, data-privacy, data-security, gdpr, hipaa
The next frontier is here: Oracles with human insight Post date August 22, 2021 Post author By Marsel Adawi Post categories In blockchain-oracles, crypto, data-governance, data-security, decentralized-finance, decentralized-governance, oracles, oracles-in-defi
Reconstruction Attacks: Examples of Invasion of Your Privacy Without Consent Post date August 22, 2021 Post author By Oblivious Post categories In collaboration-tools, data-privacy, data-security, ethical-hacking, good-company, machine-learning, privacy, security
How to Encrypt and Decrypt with NodeJS Post date August 21, 2021 Post author By Alex Adam Post categories In coding-skills, data-security, decryption, encryption, JavaScript, javascript-tutorial, learn-to-code, nodejs
What Personal Details Are You Sharing Without Knowing? Post date August 19, 2021 Post author By Mathias Hellquist Post categories In big-data, data-security, hackernoon-top-story, internet-privacy, online-privacy, privacy, vpn, vpn-and-privacy, web-monetization
Healthcare’s Biggest Cybersecurity Challenges and How to Prevent Them Post date August 19, 2021 Post author By Cybervore, Inc. Post categories In covid-19, cybercrime, cybersecurity, cybersecurity-awareness, data-security, healthcare, healthcare-cybersecurity, security
CVEs: How Keeping a Catalogue of Common Vulnerabilities and Exposures Helps Your Company Post date August 17, 2021 Post author By Deepak Gupta Post categories In cloud-computing, cloud-security, cyber-threats, cybersecurity, data-security, enterprise-security, security, vulnerabilities
How to Develop Your SAAS Application with a Security Mindset Post date August 5, 2021 Post author By Michael Georgiou Post categories In cyber-security, cybersecurity, data-security, how-to-build-a-saas-platform, how-to-implement-a-secure-sdlc, saas-development, security, user-level-data-security
23 Cybersecurity Tips To Level Up Your Data Privacy Game Post date August 3, 2021 Post author By Kiran Post categories In cybersecurity, cybersecurity-tips, data-privacy, data-protection, data-security, privacy, security, vpn, web-monetization
7 Data Analysis Steps You Should Know Post date August 3, 2021 Post author By Smitha Post categories In data-analysis, data-analysts, data-analytics, data-protection, data-science, data-security, data-visualization, predictive-analytics
3 Key Takeaways from Biden’s Cybersecurity Executive Order Post date August 1, 2021 Post author By Steven Freidkin Post categories In cyber-security, cyber-security-threats, cybersecurity, data-security, government-regulations, hackernoon-top-story, network-security, security
Choosing between Object Storage and Block Storage for Security Post date July 29, 2021 Post author By Ryan Vergara Post categories In block-storage, cloud-computing, cloud-storage, cyber-attacks, data-centers, data-security, object-storage, security
4 Handy Tips to Keep your Digital Identity Secure Post date July 9, 2021 Post author By Sebastian Petrosi Post categories In cybersecurity, data-security, digital-identity, digital-security, internet-security, online-privacy, online-security, security
Homeland Insecurity Post date July 9, 2021 Post author By newsletters Post categories In america, cybersecurity, data-security, newsletter, tech-newsletters, technology, vpn, vpn-and-privacy
What an IP Address Can Reveal About You Post date July 7, 2021 Post author By Peter Navarro Post categories In cyber-security, cyber-security-awareness, data-security, hackernoon-top-story, internet-privacy, internet-security, ip-address, security
Self-Sovereign Identity: What’s the Big Deal? Post date July 6, 2021 Post author By Affinidi Post categories In data-privacy, data-security, digital-identity, good-company, self-sovereign-identity, verifiable-credential, verifiable-credentials, what-is-a-digital-identity
Federating Learning: Privacy Aware Machine Learning Post date June 27, 2021 Post author By jmau111 Post categories In ai, data, data-privacy, data-security, federated-learning, machine-learning, ml, privacy
10 Best Tactics For Your WooCommerce Store Security Post date June 25, 2021 Post author By Sophie Zoria Post categories In 2fa, cybersecurity, data, data-security, password-security, plugins, security, woocommerce
Strategies for Combating Cloud Security Risks Post date June 23, 2021 Post author By Stephen Lange Post categories In aws, cloud, cloud-orchestration, cloud-security, cybersecurity, data-security, kms, security
How To Code To Prevent Sensitive Data Exposure Post date June 22, 2021 Post author By Oursky Post categories In android, data-security, ios, mobile-app-development, personal-data-security, security, software-development, web-development
Data-Driven Advertising and Its Impact On Our Privacy-Driven World Post date June 21, 2021 Post author By Meenu Susanna Post categories In data, data-management, data-privacy, data-security, digital-advertising, hackernoon-top-story, privacy, security
Using AWS Macie To Classify Databases Post date June 15, 2021 Post author By Leandro Mantovani Post categories In aws, aws-macie, data-classification, data-security, databases, personal-data, security, security-audit, web-monetization
Biden Administration Prioritizes Cybersecurity Funding After Numerous Cyberattacks Post date June 7, 2021 Post author By Liam Smith Post categories In amld5, cyber-attack, cyber-security, cyberattacks, cybersecurity, data-security, security, tech
Ensuring Privacy with Zero-party Data Post date May 28, 2021 Post author By Zen Media Post categories In data, data-privacy, data-protection, data-security, Google, personal-data, privacy, zero-party-data
What are Adversarial AI Attacks and How Do We Combat Them? Post date May 21, 2021 Post author By Modzy Post categories In adversarial-ml, ai, artificial-intelligence, data-security, deep-learning, good-company, modzy, security
Staking on ‘Finney’ Testnet to Counter Sybil Attacks is now LIVE!! Post date May 20, 2021 Post author By Nym Technologies Post categories In anonymity, anonymous, cryptography, cyber-security, data-security, privacy, security, testnet
What Everyone Should Know About Tools And Services Of ATO Providers Post date May 15, 2021 Post author By Liran Sorani Post categories In account-takeover, corporate-account-takeover, cyberattacks, cybersecurity, dark-data, dark-web, data-breach, data-security
Privacy Protection: How Secure is Telegram Messenger? Post date May 7, 2021 Post author By Jan Hajek Post categories In cyber-security, data-security, internet-privacy, messaging, mobile-app-security, personal-data-security, privacy, telegram
Adding a Little Salt to Passwords Can Improve Security Post date April 23, 2021 Post author By Rakesh Soni Post categories In brute-force, data-breach, data-security, dictionary-attack, hacker, password-hashing, password-salt, password-security
5 Most Important Directions In Which Tech Industry Develops In 2021 Post date April 21, 2021 Post author By Newfire Global Partners Post categories In data-privacy, data-science, data-security, datascience, digital-health, digital-healthcare, information-technology, technology-trends
EU Drafts Data Regulations for Voice Assistant Developers Post date April 9, 2021 Post author By Shannon Post categories In data-protection, data-security, eu, european-union, hacker-news, law-and-technology, technology-news, voice-assistant
Combat Online Vaccine Registration Scams With Better Cybersecurity Measures Post date April 4, 2021 Post author By John Murphy Post categories In cybersecurity, cybersecurity-awareness, data-protection, data-security, personal-data, personal-data-security, scams, trends-in-cybersecurity
A New Study On Data Privacy Reveals Information About Cybersecurity Efforts Post date April 1, 2021 Post author By Alex Simon Post categories In cyber-security-awareness, cybersecurity, cybersecurity-tips, data-privacy, data-protection, data-security, remote-work-security, security
Zero-Log VPNs Fight for User Security -Is This Reality or A Myth? Post date March 30, 2021 Post author By Sundus Post categories In data-logging, data-security, logs, no-logs, vpn, vpn-and-privacy, vpn-services, zero-logs-vpn
Automation Is the Essential Part of Cyber Risk Management: Know Why Post date March 29, 2021 Post author By Ashely John Post categories In cyber-crime, cyber-risk-management, cyber-security-automation, cybersecurity, data-breach, data-security, fraud-protection, security
Good Ways To Make Your Data More Secure Post date March 26, 2021 Post author By Newfire Global Partners Post categories In cyber-security, cybersecurity, cybersecurity-tips, data, data-privacy, data-security, data-security-guide, good-company
Building a MongoDB NoSQL E-Commerce Data Model Post date March 21, 2021 Post author By Fabric Post categories In compliance, data-privacy-compliance, data-security, database, mongodb, nosql, pci-compliance, why-mongodb
3.6 Million Websites Went Offline Due To a Fire: Decentralization Prevents That Post date March 20, 2021 Post author By Andrew Magdy Kamal Post categories In blockchain, cloud-computing, cloud-hosting, data-security, decentralization, decentralized-internet, decentralized-web, disaster-recovery
Data Backup Strategy To Reduce Data Loss Post date March 14, 2021 Post author By Digital Verma Post categories In data-backup, data-privacy, data-protection, data-security, data-structures
There Are More Risks Associated With SaaS Data Security Than Potential GDPR Fines Post date March 10, 2021 Post author By Rakesh Soni Post categories In cloud, data-privacy, data-security, enterprise, ransomware, risk-management, saas, vulnerabilities
10 Ways to Reduce Data Loss and Potential Downtime Of Your Database Post date February 26, 2021 Post author By Taavi Rehemägi Post categories In cloud-computing, data, data-protection, data-security, data-storage, database, serverless, software-development