Securing Text Fields in iOS Apps: Restricting ‘Cut,’ ‘Copy,’ and ‘Paste’ Operations Using Swift Post date November 6, 2024 Post author By Mark Fassbender Post categories In cybersecurity, data-security, ios, ios-app-development, ios-apps, secure-clipboard, securing-text-fields-in-ios, swift
Mastering the Complexity of High-Volume Data Transmission in the Digital Age Post date October 29, 2024 Post author By Ashish Karalkar Post categories In apache-kafka, apache-kafka-ecosystem, big-data, data-engineering, data-security, data-transmission, kafka-clusters, kafka-queue
Is Backup Testing Part of Your Security Strategy? Post date October 26, 2024 Post author By Zac Amos Post categories In backup-and-recovery-testing, data, data-backup, data-breach, data-protection-strategies, data-recovery, data-security, hackernoon-top-story
Take Control of Your Biometric Data: A Step-by-Step Guide to Minimizing Risk Post date September 29, 2024 Post author By Camya Rose Post categories In biometric-data, biometric-data-and-privacy, biometric-data-risks, data-security, data-security-risks, how-to-protect-your-data, personal-data-security, protect-your-data-guide
Uncle Sam’s Data Dash: U.S. Spy Agencies Seek Cost-Efficient Ways to Buy Your Information Post date September 29, 2024 Post author By The Sociable Post categories In agile-data-acquisition, data-acquisition, data-privacy, data-security, hackernoon-top-story, intelligence-community-reforms, public-data-access, u.s.-intelligence-agencies
Token2049 Singapore: Key Takeaways from the Future of Crypto and DeFi Post date September 27, 2024 Post author By Denys Tsvaig Post categories In crypto, data-security, defi, dehealth, ethereum, singapore, solana, token2049
The Rise of Mental Health Apps: What Are the Consequences? Post date September 23, 2024 Post author By Zac Amos Post categories In data-security, mental health, mental-health-apps, mhealth, mhealth-trends, pandemic, privacy, technology-and-mental-health
7th Generation Data Security: Zero Trust Data Access & Entitlements Post date September 19, 2024 Post author By yaw.etse Post categories In data-privacy, data-science, data-security, mini-sso, privacy-enhancing-technologies, what-is-a-pet, zero-trust, zero-trust-data-access
12 Tips to Protect Company’s Data Post date September 16, 2024 Post author By Dmitry Matveev Post categories In ai-in-cybersecurity, cybersecurity, cybersecurity-tips, data-security, founder-advice, saas, software-management, workflow-automation
How to Integrate KYC With Open Banking: a Comprehensive Guide for Finance Professionals Post date September 16, 2024 Post author By Noda Post categories In aml, data-security, finance, fintech, fraud-prevention, good-company, kyc, open-banking
Data Security Strategy Beyond Access Control: Data Encryption Post date September 3, 2024 Post author By jarrid.xyz Post categories In data-encryption-sdk, data-engineering, data-security, data-security-vulnerabilities, encryption, keyper, keyper-review, wannacry-ransomware-attack
“BigID’s mission is to empower enterprises to take control of their data” says BigID Co-Founder Post date August 29, 2024 Post author By NewsByte.Tech Post categories In bigid, cybersecurity, data-security, nimrod-vax, startup-founder-interview, startup-founders, startups
Why Software Updates Can Lead to Cyberattacks — and What to Do Post date August 27, 2024 Post author By Zac Amos Post categories In cyberattacks, data-security, hackernoon-top-story, malware, phishing, software-updates, vulnerability-management, zero-day-attacks
The Data Security Duo: Data Encryption and Vulnerability Scans Post date August 26, 2024 Post author By jarrid.xyz Post categories In cloud-security, data-encryption, data-engineering, data-security, infosec, product-engineering, vulnerability-management, vulnerability-scans
How Data Encryption Can Simplify Infrastructure Architecture Post date August 14, 2024 Post author By jarrid.xyz Post categories In cloud-security, cryptography, data-security, iam-based-oauth, infosec, infrastructure-architecture, security-engineering, software-architecture
The Noonification: The DevOps Paradox: A Shift Away From Ops (8/3/2024) Post date August 3, 2024 Post author By Noonification Post categories In bitcoin, data-security, devops, hackernoon-newsletter, latest-tect-stories, noonification, reactjs, reverse-engineering
3 Things CTOs Should Know About SOC 2 Compliance Post date August 3, 2024 Post author By Mike DeKock Post categories In compliance, cybersecurity-tips, data-security, hackernoon-top-story, how-to-be-a-good-cto, security-operation-center, soc-2-compliance, what-is-soc-2-compliance
From Data to Decisions: Harnessing Open Banking for Enhanced Business Performance Post date August 1, 2024 Post author By Noda Post categories In data, data-security, data-sharing, good-company, open-banking, security, the-power-of-open-banking, what-is-open-banking
8 Common Data Security Gaps in Health Care Post date July 30, 2024 Post author By Zac Amos Post categories In cybersecurity, data-security, data-storage, health-data, healthcare, it, medical-security, third-party-risk-management
Discovering the Capabilities of IoTeX’s Pebble Tracker Post date July 26, 2024 Post author By Mina Down Post categories In blockchain-application, data-security, depin-devices, internet-of-things, iotex-devices, pebble-tracker, product-reviews, web3-innovation
Data Engineering: What’s the Value of API Security in the Generative AI Era? Post date July 26, 2024 Post author By Karthik Rajashekaran Post categories In ai-regulation, api-security, cybersecurity-best-practices, data-engineering, data-privacy, data-security, generative-ai, threat-detection
Generative AI: Can ChatGPT Leak Sensitive Data? Post date July 17, 2024 Post author By Karthik Rajashekaran Post categories In ai-sensitive-data, chatgpt, chatgpt-data, cyber-security-awareness, data-privacy, data-security, gdpr, generative-ai
The Noonification: The Snowflake Hack and Its Domino Effect (7/15/2024) Post date July 15, 2024 Post author By Noonification Post categories In data-security, decentralize-ai, ethereum, hackernoon-newsletter, latest-tect-stories, low-cost-internet-in-australia, noonification, tech-companies
The Snowflake Hack and Its Domino Effect Post date July 15, 2024 Post author By Lior Barak Post categories In atandt-breach, data-architecture, data-governance, data-management, data-security, hackernoon-top-story, snowflake-hack, third-party-risk-management
Data Analysis Applied to Auto-Increment API fields Post date June 28, 2024 Post author By Ivan Mochalov Post categories In api, auto-increment-columns, cyber-security, data-analysis, data-scraping, data-security, information-security, sql-database
Shhh…The Secret to Secrets Management: What You Need to Know Post date June 26, 2024 Post author By Tom Hacohen Post categories In data-security, handling-sensitive-info, how-to-protect-passwords, personal-data-security, protecting-sensitive-info, safeguarding-data, secrets-management, secrets-management-solution
The Role of Data Destruction in Cybersecurity Post date June 26, 2024 Post author By Zac Amos Post categories In cybersecurity, data, data-destruction, data-recovery, data-security, hackernoon-top-story, hard-drive, nist
How To Integrate Behavioral Biometrics Into AI Assistance for Security Post date June 18, 2024 Post author By April Miller Post categories In ai-and-biometric-techology, behavioral-biometrics, biometric-technology, cyber-security-awareness, cybersecurity, cybersecurity-tips, data-security, security
Building a Secure Future: An Introduction to Zero Trust Security Post date January 23, 2023 Post author By Saeed Mohajeryami, PhD Post categories In cloud, data-security, zero-trust
What is a Distributed Storage Network on a Blockchain System? Post date December 8, 2021 Post author By Amelia Post categories In blockchain-technology, blockchainstorage, data-security, data-storage, decentralized-data-storage, decentralized-internet, distributed-storage, technology-trends
7 Serious Security Issues in Big Data and How to Address Them Post date December 8, 2021 Post author By Junaid Tariq Post categories In benefits-of-big-data, big-data, big-data-security, big-tech, data-privacy, data-security, security-issues-in-big-data, security-threats
The Two Best Ways To Scan For PII In Your Data Warehouse Post date December 5, 2021 Post author By Rajat Venkatesh Post categories In data-privacy, data-security, data-warehouse, database, personal-data, personal-data-security, pii-in-your-data-warehouse, programming
A Cryptographer’s Guide to End-to-End Encryption Post date November 23, 2021 Post author By Tresorit Post categories In cybercrime, cybersecurity, data-security, encryption, front-end developer, good-company, guide-to-end-to-end-encryption, security
Employ These 4 Simple Practices to Improve Company Data Security Post date November 15, 2021 Post author By newsletters Post categories In cybersecurity, data-science, data-security, encryption, hackernoon, newsletter, security, sensitive-data
The Centralized Internet is Broken Post date November 7, 2021 Post author By jmau111 Post categories In big-tech, centralized-internet, centralized-internet-is-broken, data-privacy, data-security, decentralization, decentralized-internet, privacy
Being ‘Chief Geek’ and Running 15 Websites with Noonies Nominee Mathias Hellquist Post date November 4, 2021 Post author By Mathias Hellquist Post categories In big-data, data-security, information-security, interview, noonies-nominees, noonies2021, privacy, vpn, web-monetization
5 Common Identity and Access Management Security Risks Post date November 4, 2021 Post author By Jessica Truong Post categories In access-management, blogging-fellowship, cybersecurity, data-safety, data-security, iam, identity-and-access-management, identity-management
How to Choose the Right Hyper-V Backup Strategy Post date November 3, 2021 Post author By VALERY M Post categories In backup, cybersecurity, data, data-privacy, data-security, hyper-v, hyper-v-backup, software-development
How to Ensure Data Integrity in an Organization Post date October 27, 2021 Post author By Jessica Truong Post categories In blogging-fellowship, cyber-threats, cybersecurity, data-integrity, data-integrity-in-organization, data-privacy, data-security, ensure-data-integrity
How to Scan Your Systems for Personal Data Post date October 26, 2021 Post author By Soveren Post categories In cybersecurity, data-analysis, data-privacy, data-security, good-company, personal-data, personal-data-across-systems, personal-data-security
Improving IoT Device Security Prevention from Zero-Day Attacks Post date October 2, 2021 Post author By Check Point Software Post categories In checkpoint, cyber-security, data-security, good-company, IoT, iot-device-security, iot-firmware-security, security
Apple vs Microsoft: Who Offers Better Security? Post date October 1, 2021 Post author By Jessica Truong Post categories In apple-m1, apple-security, blogging-fellowship, cybersecurity, data-security, device-security, hackernoon-top-story, microsoft-windows
How to Structure an Effective Digital Defense Team Post date September 30, 2021 Post author By Nick Shevelyov Post categories In build-digital-defence-team, cybercrime, cybersecurity, data-security, digital-defence, hackernoon-top-story, hacking, security
Password Security in 2021 — A Complete Guide Post date September 25, 2021 Post author By JDLT Post categories In cyber-security, data-security, good-company, hackernoon-top-story, password-security, password-security-in-2021, passwords, security
A Look at COVID’s Impact on Data Privacy and Protection Post date September 24, 2021 Post author By Shannon Post categories In coronavirus-impact-on-business, covid-19, covid-impact-on-data-privacy, data, data-security, personal-data, security, trends-in-cybersecurity
Fast Fourier Transform: Scaling Multi-Point Evaluation Post date September 18, 2021 Post author By Vitalik Buterin Post categories In blockchain, blockchain-security, data-security, fast-fourier-transform, fft, starks, vitalik-buterin, what-is-fast-fourier-transform
Network Security 101: Everything You Need to Know Post date September 7, 2021 Post author By Jessica Truong Post categories In blogging-fellowship, cybersecurity, data-security, hackernoon-top-story, network-security, network-security-basics, networking, security-basics
8 Cloud Compliance Frameworks and Why Cloud-based Organizations Need Them Post date August 26, 2021 Post author By Alex Jordan Post categories In business, cloud-computing, cloud-infrastructure, compliance, data-privacy, data-security, gdpr, hipaa
The next frontier is here: Oracles with human insight Post date August 22, 2021 Post author By Marsel Adawi Post categories In blockchain-oracles, crypto, data-governance, data-security, decentralized-finance, decentralized-governance, oracles, oracles-in-defi
Reconstruction Attacks: Examples of Invasion of Your Privacy Without Consent Post date August 22, 2021 Post author By Oblivious Post categories In collaboration-tools, data-privacy, data-security, ethical-hacking, good-company, machine-learning, privacy, security
How to Encrypt and Decrypt with NodeJS Post date August 21, 2021 Post author By Alex Adam Post categories In coding-skills, data-security, decryption, encryption, JavaScript, javascript-tutorial, learn-to-code, nodejs
What Personal Details Are You Sharing Without Knowing? Post date August 19, 2021 Post author By Mathias Hellquist Post categories In big-data, data-security, hackernoon-top-story, internet-privacy, online-privacy, privacy, vpn, vpn-and-privacy, web-monetization
Healthcare’s Biggest Cybersecurity Challenges and How to Prevent Them Post date August 19, 2021 Post author By Cybervore, Inc. Post categories In covid-19, cybercrime, cybersecurity, cybersecurity-awareness, data-security, healthcare, healthcare-cybersecurity, security
CVEs: How Keeping a Catalogue of Common Vulnerabilities and Exposures Helps Your Company Post date August 17, 2021 Post author By Deepak Gupta Post categories In cloud-computing, cloud-security, cyber-threats, cybersecurity, data-security, enterprise-security, security, vulnerabilities
How to Develop Your SAAS Application with a Security Mindset Post date August 5, 2021 Post author By Michael Georgiou Post categories In cyber-security, cybersecurity, data-security, how-to-build-a-saas-platform, how-to-implement-a-secure-sdlc, saas-development, security, user-level-data-security
23 Cybersecurity Tips To Level Up Your Data Privacy Game Post date August 3, 2021 Post author By Kiran Post categories In cybersecurity, cybersecurity-tips, data-privacy, data-protection, data-security, privacy, security, vpn, web-monetization
7 Data Analysis Steps You Should Know Post date August 3, 2021 Post author By Smitha Post categories In data-analysis, data-analysts, data-analytics, data-protection, data-science, data-security, data-visualization, predictive-analytics
3 Key Takeaways from Biden’s Cybersecurity Executive Order Post date August 1, 2021 Post author By Steven Freidkin Post categories In cyber-security, cyber-security-threats, cybersecurity, data-security, government-regulations, hackernoon-top-story, network-security, security
Choosing between Object Storage and Block Storage for Security Post date July 29, 2021 Post author By Ryan Vergara Post categories In block-storage, cloud-computing, cloud-storage, cyber-attacks, data-centers, data-security, object-storage, security
4 Handy Tips to Keep your Digital Identity Secure Post date July 9, 2021 Post author By Sebastian Petrosi Post categories In cybersecurity, data-security, digital-identity, digital-security, internet-security, online-privacy, online-security, security