Hirusha Fernandohirushafernando.hashnode.dev·Mar 28, 2024PII Masking With Python Using Machine Learning ModelPII (Personally Identifiable Information) masking is a technique used to hide sensitive data from the public. We can employ a machine learning model for this purpose. Once, in my project, I had to send a text to an LLM (Language Model) and retrieve t...DiscussMachine Learning
Jiyajiyajha.hashnode.dev·Mar 26, 2024Unlocking Secrets: The Intriguing World of Encryption Software and its Impact on Data SecurityData sent and received over the internet can be kept private and secure with encryption. Passwords, credit card details, conversations with coworkers, or even just sending family photos to friends and family might all fall under this category. Encryp...Discuss#encryptedcommunications
Ruhi Parveenitcourses0001.hashnode.dev·Mar 23, 2024Machine Learning's Integral Role in Data ScienceData science is a multidisciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data. At the heart of data science is machine learning, a subset of artifici...DiscussData Science
YiliaforAPI7api7.hashnode.dev·Mar 21, 2024Data Masking: Securing Data Safety and Compliance with API7 EnterpriseProtecting sensitive data has become increasingly crucial in today's data-driven world. Safeguarding sensitive data such as personal privacy, financial information, and business secrets during storage, processing, and transmission poses a significant...Discuss·33 likesdata masking
Mohamed Ismail Sihssmaheel.hashnode.dev·Mar 16, 2024Shielding Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐Hey There, 👋 Awesome Developers! 🚀 Today, let's explore the AES-GCM encryption and decryption with code examples in JS, TS, Java and Python. If you're eager to enhance your data protection skills! 👇 Let's get started! Introduction 🚀 Ever felt wor...DiscussJavaScript
John Highsmithjhighsmith0033.hashnode.dev·Mar 4, 2024Optimizing Data Security in Hyper-V Settings: Advanced Backup Strategies for Windows ServerIntroduction In today's digital landscape, safeguarding data within Hyper-V environments hosted on Windows Server is paramount for businesses of all sizes. The integration of robust backup solutions not only ensures business continuity but also provi...DiscussHyper-V Backup Strategies
Kiran ReddyforDatabricks - PySparkdatabricks-pyspark-blogs.hashnode.dev·Feb 29, 2024Unlocking Data Security: A Comprehensive Guide to Databricks Secret Scopes2 Easy Ways to Create & Manage Databricks Secret Scopes Introduction In today's data-driven landscape, where technology facilitates the effortless creation and storage of vast volumes of information, the significance of data security cannot be overst...Discuss·10 likesDatabricks Secret
Sumit Mondalsumit007.hashnode.dev·Feb 23, 2024A Beginner's Guide to Using Amazon Macie in AWSIntroduction: In the vast world of AWS services, security is a top priority for businesses and individuals alike. Amazon Macie, a powerful security service, offers an easy and effective way to discover, classify, and protect sensitive data. In this b...Discuss·1 likeAWS - HandsOn2Articles1Week
Niranjan Gblog.securityinsights.io·Feb 11, 2024AWS KMS vs CloudHSM: A Comprehensive Comparison (Part 4)Introduction: Welcome to the final part of our in-depth comparison of AWS KMS and CloudHSM! In this concluding segment, we will examine the security features of each service and discuss best practices for ensuring the confidentiality, integrity, and ...DiscussAws kms
Niranjan Gblog.securityinsights.io·Feb 11, 2024AWS KMS vs CloudHSM: A Comprehensive Comparison (Part 3)Introduction: We've reached Part 3 of our in-depth comparison of AWS KMS and CloudHSM! In this segment, we'll examine the pricing models of each service and analyze their cost-effectiveness. Understanding the costs associated with these key managemen...DiscussAws kms