Harshit Pathakharshitgeek.hashnode.dev·Sep 24, 2023Simplifying Access with Single Sign-On (SSO) – A Real-World PerspectiveIntroduction: Have you ever wondered how you can effortlessly access multiple online services without remembering a plethora of usernames and passwords? Single Sign-On (SSO) is the answer to this digital convenience. In this article, we'll explore th...Discuss·6 likesSSO
Joel Odeyohekpejeodey.com·Sep 23, 2023Unleashing Splunk: A Guide to Elevating Cybersecurity in OrganizationsIn the digital age, where data flows like a river and threats lurk in the shadows, organizations are on a constant quest to fortify their cyber defences. Enter Splunk, a potent tool that shines a spotlight on data and empowers organizations to detect...DiscussSplunkSplunk
Arhaan Sayeeddev-arhaan.hashnode.dev·Sep 7, 2023Navigating the Sea of Information Overload: A GuideIntroduction In today's digital age, the internet has transformed into an immense repository of information, offering insights into various fields. However, this vast expanse of information comes with its own set of challenges. The abundance of data ...Discuss·1 like·53 readsinformation security
Daniel AJAVONayidablog.hashnode.dev·Sep 5, 2023Connecter Git à GitHub en utilisant SSH sur LinuxSi vous êtes un développeur utilisant Git et GitHub, vous savez peut-être déjà à quel point il est pratique de connecter ces deux outils. Cela vous permet de gérer vos référentiels GitHub sans avoir à saisir votre nom d'utilisateur et votre mot de pa...DiscussGit & GithubGitHub
Jonathan CilleyProjonathancilley.hashnode.dev·Aug 21, 2023Adventures in Running a Honeypot HiveLately, I have been working on one of the more fun hobby projects that I have decided to attempt. Since I spend a lot of my day thinking about and managing information security processes and tools, I thought going through the exercise of setting up m...Discuss·43 readsHoneypot
Joel Odeyohekpejeodey.com·Aug 11, 2023Nurturing Safety in the Startup Universe: A Journey into Information SecurityVenturing into the dynamic world of startups is akin to setting sail on a grand expedition, where every twist and turn holds the promise of discovery. But as startups embark on their odyssey of innovation and growth, they must also navigate the uncha...Discuss·10 likesinformation security
BountyHunt3rbountyhunt3r.xyz·Aug 4, 2023The Only Audit Methodology You Will Ever Need. 01 - The DiveWhat I’m about to share with you took me from: “I have no freaking idea what this code base does! It is so freaking big, I will lose my job!!” To: “I can predict what the next function call will be, and I can locate the exact line of code that will ...Discuss·56 readsWeb3
Ransom Olukotuncyber-ransom.hashnode.dev·Jul 31, 2023Improving Information Security with Two-Factor AuthenticationIntroduction: Cyberattacks and data breaches have become increasingly common, with hackers constantly developing new techniques to steal sensitive information. Organizations of all sizes need robust cybersecurity measures in place to protect themselv...Discuss·10 likes#cybersecurity
Olamide Olabodeolasquare.hashnode.dev·Jul 25, 2023Cybersecurity Vs Information Security: Similarities and DifferencesIntroduction Hello there, curious minds! Let's take a quick dive into the fascinating world of Cybersecurity and Information Security to explore the similarities and differences between these two crucial domains. The terms Cybersecurity and Informat...Discuss·1 like·52 reads#cybersecurity
Emily Martingdpr.hashnode.dev·Jul 24, 2023The CJEU Declares the EU-US Privacy Shield Invalid and SCCs ValidOn 16 July 2020, the Court of Justice of the European Union (CJEU) made a significant ruling concerning the adequacy of the EU-US Privacy Shield and standard contractual clauses (SCCs), in accordance with GDPR principles. The Privacy Shield was a mec...Discuss#gdpr