Best Practices for Securing Cloud Environments Against Cyber Threats Post date November 12, 2024 Post author By Advait Patel Post categories In cloud-security, cybersecurity-best-practices, data-encryption, data-protection, digital-privacy, identity-access-management, information-security, security-audit
The (Digital) Identity Paradox: Convenience or Privacy? Post date October 8, 2024 Post author By Pranav Khare Post categories In ai-ethics, data-privacy, data-privacy-and-security, data-protection, digital-identity, digital-identity-protection, ethical-ai-development, hyper-personalization
What Every Blockchain Needs: Confidentiality Post date August 23, 2024 Post author By Jillian Godsil Post categories In blockchains, confidential-computing, data-privacy, data-protection, decc, privacy, smart-contracts, web3-privacy
Masking Sensitive Data in AWS CloudWatch Logs Post date August 18, 2024 Post author By Josh Thorne Post categories In aws, aws-cdk, cloudwatch, data-protection, logging
Smart but Depressed or Dumb but Happy: The Internet’s Red Pill-Blue Pill Dilemma Post date July 18, 2024 Post author By The Tech Panda Post categories In data-protection, gender-based-violence, hackernoon-top-story, internet-addiction, internet-safety, online-abuse, online-disinformation, social-media-misinformation
How to Protect Your Business From Insider Threats Post date July 15, 2024 Post author By Favour Efeoghene Post categories In business-security, cybersecurity-for-small-business-owners, data-protection, insider-threat, protect-your-business, risk-management, security-awareness, security-strategies
How to exchange a secret key over an insecure network (EC-Diffie-Hellman algorithm) Post date December 16, 2022 Post author By Mikhail Karavaev Post categories In cryptography, data-protection, diffie-hellman, elliptic-curve, security
The 5 Pillars of Cybersecurity for the Hidden Dangers We Confront Every Day Post date November 2, 2021 Post author By Jacky Cheung Post categories In cyber-defense, cyber-protection-for-hidden, cyber-threat-intelligence, cyber-threats, cybercrime, cybersecurity, data-protection, predictive-cyber-protection
Why Businesses Need Data Governance Post date October 9, 2021 Post author By Castor Post categories In business-need-data-governance, data, data-analytics, data-catalog, data-engineering, data-governance, data-protection, product-data
What are the Key Stages of Data Protection Impact Assessment? Post date October 7, 2021 Post author By Narendra Sahoo Post categories In data-processing, data-protection, dpia, europe, european-union, gdpr, gdpr-compliance, key-stages-data-protection
Why Are Businesses Raising Equity with Crowdfunding? Post date October 1, 2021 Post author By TIKI Post categories In crowdfunding, data-privacy, data-privacy-compliance, data-protection, equity-crowdfunding, fundraising, gdpr, user-data-privacy
Confidential Computing: How Intel SGX is Helping to Achieve It Post date September 23, 2021 Post author By Borko Drljaca Post categories In confidential-computing, cybersecurity, cybersecurity-top-story, data-privacy, data-protection, encryption, intel-sgx, security
4 Ways Cities Are Utilizing Data for Public Safety Post date August 25, 2021 Post author By Shannon Post categories In data, data-analytics, data-privacy, data-protection, Public Policy, public-health, safety, smart-city
5 Data Breach Safety Measures That are Essential to Every Business Post date August 22, 2021 Post author By Alister Esam Post categories In business-security, cybercrime, cybersecurity, data-privacy, data-protection, data-safety, online-business, security
23 Cybersecurity Tips To Level Up Your Data Privacy Game Post date August 3, 2021 Post author By Kiran Post categories In cybersecurity, cybersecurity-tips, data-privacy, data-protection, data-security, privacy, security, vpn, web-monetization
7 Data Analysis Steps You Should Know Post date August 3, 2021 Post author By Smitha Post categories In data-analysis, data-analysts, data-analytics, data-protection, data-science, data-security, data-visualization, predictive-analytics
Manage Your Emails Like You Manage Your Passwords Post date July 29, 2021 Post author By Corvo Post categories In data-privacy, data-protection, email, email-security, information-security, password-protection, password-security, security
Securing your SDLC for Open Source Applications Post date June 25, 2021 Post author By Ryan Vergara Post categories In cybersecurity, data-protection, development, security, security-vulnerability, software-development-lifecycle, software-security, sofware-development
How to Deal with Tech Trust Deficit Post date June 25, 2021 Post author By Zen Media Post categories In customer-trust, data, data-privacy, data-protection, future-of-tech, privacy, tech-trends, trust
How To Protect Your Data Against Credit Card Breaches Post date June 16, 2021 Post author By Madiha Jamal Post categories In credit-card-scam, credit-cards, cybersecurity, data-breaches, data-protection, hacking, how-to-protect-my-data-online, rfid
Reasons Why Data Privacy Matters Post date June 15, 2021 Post author By Emma Davis Post categories In apple, cookies, data, data-privacy, data-protection, internet-data-privacy, privacy, user-data-privacy
Ensuring Privacy with Zero-party Data Post date May 28, 2021 Post author By Zen Media Post categories In data, data-privacy, data-protection, data-security, Google, personal-data, privacy, zero-party-data
5 Ways to Protect Your Facebook Account from Getting Hacked Post date April 24, 2021 Post author By CellTrackingApps Post categories In compromised-passwords, cybersecurity, data-protection, facebook, facebook-hacking, hacking, password-security, vpn
EU Drafts Data Regulations for Voice Assistant Developers Post date April 9, 2021 Post author By Shannon Post categories In data-protection, data-security, eu, european-union, hacker-news, law-and-technology, technology-news, voice-assistant
Combat Online Vaccine Registration Scams With Better Cybersecurity Measures Post date April 4, 2021 Post author By John Murphy Post categories In cybersecurity, cybersecurity-awareness, data-protection, data-security, personal-data, personal-data-security, scams, trends-in-cybersecurity
Cloud Security Strategies For Small Businesses Post date April 3, 2021 Post author By TechMoths Post categories In cloud, cloud-computing, cloud-infrastructure, cloud-security, cloud-service, cloudservices, data-protection, programming
A New Study On Data Privacy Reveals Information About Cybersecurity Efforts Post date April 1, 2021 Post author By Alex Simon Post categories In cyber-security-awareness, cybersecurity, cybersecurity-tips, data-privacy, data-protection, data-security, remote-work-security, security
Have We Lost The Privacy Battle To Supercookies? Post date March 22, 2021 Post author By Mahdhi Rezvi Post categories In data-protection, front-end-development, privacy, technology, web-development
Data Backup Strategy To Reduce Data Loss Post date March 14, 2021 Post author By Digital Verma Post categories In data-backup, data-privacy, data-protection, data-security, data-structures
10 Ways to Reduce Data Loss and Potential Downtime Of Your Database Post date February 26, 2021 Post author By Taavi Rehemägi Post categories In cloud-computing, data, data-protection, data-security, data-storage, database, serverless, software-development
Using Unmasked Production Data For Testing Leaves Your At Risk For Data Breaches Post date February 25, 2021 Post author By DATPROF Post categories In data-breach, data-breach-prevention, data-privacy, data-protection, data-security, personal-data-security, software-testing, testing
E-commerce Cybersecurity - Enhancing Data Protection in 2021 Post date February 22, 2021 Post author By Cybervore, Inc. Post categories In cyber-attacks, cyber-security, cyber-threats, cybersecurity, data-protection, data-security, e-commerce-business, ecommerce
On The Verge of Economic Change: An Interview with Dr Sebastian Bürgel Post date February 21, 2021 Post author By Andrey Sergeenkov Post categories In blockchain, crypto, data-privacy, data-protection, decentralization, hopr, interview, vpn
Investing in Cybersecurity to Build a Successful Exchange – With Ben Zhou, CEO at Bybit Post date February 19, 2021 Post author By Ishan Pandey Post categories In blockchain, cryptocurrency, cryptocurrency-regulation, cybersecurity, data-protection, derivatives, interview, startup
Why You Should Consider Becoming an Ethical Hacker in 2021 Post date February 16, 2021 Post author By Terry Franson Post categories In black-hat-hackers, data-protection, ethical-hacking, guided-hacking, hidden-hacking-techniques, learning, prevents-data-theft, social-engineering
Formjacking Attacks: Defention and How To Prevent It Post date February 2, 2021 Post author By Lauranutt Post categories In cyber-threats, cybersecurity, cybersecurity-awareness, data-breach, data-protection, data-security, formjacking, identity-management