Nicholas Diamondnicholasdiamond.hashnode.dev·Oct 18, 2024Hardening Node.js APIs Against Injection Attacks and Data BreachesAPI security is a critical aspect of building modern applications, especially as the threat landscape continues to evolve. Among the most common attack vectors targeting APIs are injection attacks, such as SQL injection and NoSQL injection. These att...DiscussNode.js
Parablu Incparabluinc.hashnode.dev·Jul 12, 2024Understanding the Role of Security Patches in Data Protection StrategiesIn today's interconnected digital landscape, safeguarding data is crucial for both individuals and businesses. Cyber threats continue to evolve, making it imperative to adopt robust strategies to protect sensitive information. One essential component...Discusssecurity patches
Gokula Krishnangokulakrishnan.hashnode.dev·Jul 12, 2023Unveiling the Invisible Threat: Understanding Data Breaches and Their ImpactIn Today's Digital Age, we spend a significant amount of time in front of our PC/mobile screens where we work, study, or entertain ourselves online. To access these platforms, we need to register our personal information and create an account. The in...Discuss·6 likes·66 readsdatabreach
Michael K. Aboagyering3.hashnode.dev·Jun 15, 2023Threat Modeling Vs. Vulnerability ManagementAlthough threat modeling and vulnerability management help businesses secure data infrastructures and services, there are differences. This article discusses the differences between threat modeling and vulnerability management. We look at the pros an...Discuss·98 reads#cybersecurity
Banyan Cloudbanyancloud.hashnode.dev·May 26, 2023Shield Your Data Fortress: Unleashing The Power Of Data Governance & Database Security Posture Management (DbSPM)Introduction In the fast-paced digital landscape, safeguarding an organization’s data storage is no longer an option—it’s an absolute necessity. With cyber threats and data breaches on the rise, ensuring the security and integrity of sensitive inform...DiscussData security
Green Methodgreenmethod.hashnode.dev·May 9, 2023How to Prevent Data Breaches in 2023: Best Practices and TacticsInstances of data breach incidents are on the rise as many organisations are unwittingly committing similar errors that have caused some of the most significant data breaches in history. Data breaches can have severe consequences for organisations, i...Discuss#cybersecurity
Kristof RiebbelsProdotnet.kriebbels.me·Mar 5, 2023When two-factor authentication is uselessPreviously on... In my previous post, I stated that I will begin a series that will give the reader insight into my journey of protecting my data. I summed up multiple subjects I want to explore. I already put my IoT devices on my guest network. But ...Gemma Black and 1 other are discussing this2 people are discussing thisDiscuss·1 like·45 readsPrivacyprivacy
Kristof RiebbelsProdotnet.kriebbels.me·Feb 26, 2023How to know if your data is leaked?Previously on... I am working with the authentication and authorization protocols OpenIDConnect and OAuth2. The identity providers that my customer uses are Auth0 and ItsMe. Safe to say, the nature of my assignment consists of private and security-se...Discuss·67 readsPrivacyprivacy
Farhan Ashrafblog.farhanashraf.dev·Jan 13, 2023HaveIBeenPwned Breach? Here's What You Need to Know and DoI hope it never happens to us, but data breaches are becoming increasingly common in today's digital age. If you've received an email notification from HaveIBeenPwned (HIBP) or check it for the first time yourself to find out that that one of your ac...Discuss·158 readsdatabreach
Kerwintriminator.hashnode.dev·Jan 2, 2023WCB #1-LastPassSummary Hello and welcome to the first installment of my weekly cyber brief. For this series, I plan to discuss an interesting event that has occurred in the realm of Cybersecurity every week. This past week saw a whole host of interesting events fro...DiscussWeekly Cyber Brief#cybersecurity