Gokula Krishnangokulakrishnan.hashnode.dev·Jul 12, 2023Unveiling the Invisible Threat: Understanding Data Breaches and Their ImpactIn Today's Digital Age, we spend a significant amount of time in front of our PC/mobile screens where we work, study, or entertain ourselves online. To access these platforms, we need to register our personal information and create an account. The in...Discuss·6 likes·66 readsdatabreach
Michael K. Aboagyering3.hashnode.dev·Jun 15, 2023Threat Modeling Vs. Vulnerability ManagementAlthough threat modeling and vulnerability management help businesses secure data infrastructures and services, there are differences. This article discusses the differences between threat modeling and vulnerability management. We look at the pros an...Discuss·97 reads#cybersecurity
Banyan Cloudbanyancloud.hashnode.dev·May 26, 2023Shield Your Data Fortress: Unleashing The Power Of Data Governance & Database Security Posture Management (DbSPM)Introduction In the fast-paced digital landscape, safeguarding an organization’s data storage is no longer an option—it’s an absolute necessity. With cyber threats and data breaches on the rise, ensuring the security and integrity of sensitive inform...DiscussData security
Green Methodgreenmethod.hashnode.dev·May 9, 2023How to Prevent Data Breaches in 2023: Best Practices and TacticsInstances of data breach incidents are on the rise as many organisations are unwittingly committing similar errors that have caused some of the most significant data breaches in history. Data breaches can have severe consequences for organisations, i...Discuss#cybersecurity
Kristof RiebbelsProdotnet.kriebbels.me·Mar 5, 2023When two-factor authentication is uselessPreviously on... In my previous post, I stated that I will begin a series that will give the reader insight into my journey of protecting my data. I summed up multiple subjects I want to explore. I already put my IoT devices on my guest network. But ...Gemma Black and 1 other are discussing this2 people are discussing thisDiscuss·1 like·66 readsPrivacyprivacy
Kristof RiebbelsProdotnet.kriebbels.me·Feb 26, 2023How to know if your data is leaked?Previously on... I am working with the authentication and authorization protocols OpenIDConnect and OAuth2. The identity providers that my customer uses are Auth0 and ItsMe. Safe to say, the nature of my assignment consists of private and security-se...Discuss·82 readsPrivacyprivacy
Farhan Ashrafblog.farhanashraf.dev·Jan 13, 2023HaveIBeenPwned Breach? Here's What You Need to Know and DoI hope it never happens to us, but data breaches are becoming increasingly common in today's digital age. If you've received an email notification from HaveIBeenPwned (HIBP) or check it for the first time yourself to find out that that one of your ac...Discuss·172 readsdatabreach
Kerwintriminator.hashnode.dev·Jan 2, 2023WCB #1-LastPassSummary Hello and welcome to the first installment of my weekly cyber brief. For this series, I plan to discuss an interesting event that has occurred in the realm of Cybersecurity every week. This past week saw a whole host of interesting events fro...Discuss·68 readsWeekly Cyber Brief#cybersecurity
Chandan Mehtacryptohub.hashnode.dev·Nov 17, 2022Data privacy ! A ConcernWhat did you searched on Search engine today ? Something about shoes, t-shirts etc. Well that's not my concern. My concern is what's going in the back when you search something on internet. Have you ever wondered why you see similar ads on almost ev...Discuss·29 readsdata
Solomon Achugwohsecuredtips.hashnode.dev·Sep 19, 2022Uber internal system breach by teenage hackerWhy bother with expensive and complex zero-day exploits when there are much easier ways to bypass a company security system. This was the case when Uber announced On Friday 16 September 2022 by 2:25am via their PR Twitter account that they were hacke...Discuss·157 readsdatabreach