Victor Ukohatpscript.hashnode.dev·Dec 17, 2024Signing Data/Files With Digital SignaturesDigital signatures are mathematical schemes used to ensure the integrity and authenticity of data, files and documents. They use cryptography to authenticate to sender of a message or the signer of a document. They provide a way to verify the identit...Cybertricksdigitalsignature
Subinoy Roywork-in-progress.hashnode.dev·Nov 17, 2024Log masking and encryption at rest in Spring Boot for GDPREn route to creating a GDPR-compliant application, our first pit stop will create a simple Spring Boot application that encrypts PII fields and masks them during logging. What we will be doing... We will develop a basic application for creating and r...Data SecuritySpring
Jayachandran Ramadossaskjr.hashnode.dev·Oct 24, 2024Database Replication: What’s Shaping Tomorrow’s Data Systems?As we move further into the digital age, the way we handle and store data continues to evolve. One key aspect of data management that has gained significant attention is database replication. Replication helps ensure data availability, reliability, a...replication
Subhanshu Mohan Guptablogs.subhanshumg.com·Sep 1, 2024Self-Sovereign Identity (SSI) in DevSecOps: Enhancing Security and Privacy in User AuthenticationIntroduction In today's digital landscape, the need for secure and privacy-preserving user authentication has never been more critical. Traditional identity management systems, often centralized, expose users to risks such as identity theft, data bre...40 likes·31 readsAI powered DevOpsDevSecOps
Heuristic Informaticsenterprisedigitaltransformation.hashnode.dev·Aug 21, 2024How Audit Vault Services Ensure Compliance with Industry RegulationsWith numerous databases, applications, and operating systems in use, auditing and monitoring user and administrator activities is essential for both security and compliance. This requires the continuous collection and analysis of vast amounts of acti...auditing
Aditya Ladadityaladblog.hashnode.dev·Feb 27, 2024SQL injection attackIntroduction:- It involves inserting SQL Queries through user input to manipulate the database. Successful exploitation can result in: Reading sensitive data from the database. Modifying database entries through insert, update, or delete operati...10 likes·29 reads#sqlinjection
Musaib Altafmusaaib.hashnode.dev·Jan 12, 2024Securing Your Django Admin: A Comprehensive Guide to Creating a 2FA Security System for the Django Admin PanelThere was an era where atomic and nuclear weapons were considered the most destructive paraphernalia and no doubt they are, but the era has changed and so has the definition of the most destructive weapons. Now, the clock of destruction ticks one and...2 likes·75 readsdjangosecurity
George Mbuguanguregeorge.hashnode.dev·Aug 4, 2023Data science MethodologiesData has established itself as the driving force in this era of machines and mechanical growth. Every organization, whether it be a financial institution or a health organization, is moving towards data solutions. How are we leveraging our data to ad...1 likeData Science