Babu Annamalaimysticmind.dev·a day agoEncrypting and crypto-shredding of PII data in Marten documents using HashiCorp VaultProtecting Personally Identifiable Information (PII) has become essential as organizations handle increasing volumes of sensitive data. Regulations like the GDPR (General Data Protection Regulation) mandate strict controls over PII to safeguard indiv...Discuss·31 reads#martendb
Chetan Mohanrao Mohoddevops-concepts-by-chetan.hashnode.dev·Nov 13, 2024Storing Passwords in Jenkins—Here’s How I Keep Them Safe and Sound!First, create a Personal Access Token. How do you create a PAT? Follow These Steps: Log in to DockerHub: https://hub.docker.com/ Go to Account settings: Click on Generate New Token: Add the following details: Once you click on Generate,...Discuss·43 readsJenkins credentials
Romman Sabbirrommansabbir.com·Nov 11, 2024Network Security in Android: A Comprehensive Guide [PART 4]Network security is critical for protecting the communication between your Android app and remote servers. Without proper security measures, sensitive data like user credentials, personal information, or financial details can be intercepted, altered,...Discuss·28 readsAndroid : Security, Encryption and Secure Practicescertificatepinning
Fields Marshallfieldsmarshall.com·Nov 7, 2024Simple Encryption for .env files in Node.jsEncrypting your .env file in a Node.js project helps protect sensitive environment variables, such as API keys and database URLs, especially when sharing code or deploying applications. This approach allows you to keep these details secure while stil...Discussnpm
Romman Sabbirrommansabbir.com·Nov 2, 2024Secure User Authentication in Android: A Comprehensive Guide [PART 2]User authentication is one of the most critical security aspects of any mobile application. Implementing secure authentication methods ensures that users’ data and accounts are protected from unauthorized access. In this article, we will dive deep in...Discuss·40 readsAndroid : Security, Encryption and Secure PracticesAndroid
George Palangattilblog.gepal.cz·Oct 29, 2024How to Encrypt a RDS DB InstanceOverview Amazon RDS offers encryption for DB instances, ensuring that data at rest, including underlying storage, automated backups, read replicas, and snapshots are protected. It employs the industry-standard AES-256 encryption algorithm, which oper...Discussencryption
Anushamys-anusha.hashnode.dev·Oct 28, 2024Is your Data really Private? You need to know the Truth about End-To-End EncryptionYou hear it everywhere: "End-to-End Encryption", E2EE – the holy grail of secure messaging. But here’s the big question: Is it actually as private as companies claim, or are you only getting half the story? Let’s dive into what this really means for ...DiscussE2E
Utkarsh Kumarutkarsh89.hashnode.dev·Oct 28, 2024Encryption Evolution: From Classical Ciphers to Quantum SecurityIn today’s interconnected world, securing digital information is paramount. Encryption, the cornerstone of data protection, has evolved dramatically from its rudimentary beginnings to the sophisticated algorithms safeguarding our modern communication...Discuss·4 likesencryption
Romman Sabbirrommansabbir.com·Oct 27, 2024Android Security Approaches: Encryption and Secure PracticesIn this article, we explore essential security techniques and encryption methods to protect Android applications. Covering a broad spectrum of security approaches, we highlight the use of data encryption (AES, RSA, and Android KeyStore), secure user ...Discuss·87 readsAndroid : Security, Encryption and Secure Practicesapproaches
J3bitokjebitok.hashnode.dev·Oct 27, 2024Cryptography: Cryptography Basics (TryHackMe)In this article, I will write a write-up for Cryptography Basics that covers the Importance of Cryptography, Plaintext to Ciphertext, Historical Ciphers, Types of Encryption and Basic Math in cryptography and symmetric encryption. What is the standa...DiscussCryptography