Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
datasecurity
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes
Narendrasahoo
Narendrasahoo
Narendrasahoo
Follow
Jan 21
Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes
#
cybersecurity
#
infosec
#
datasecurity
Comments
Add Comment
3 min read
Data Security in Salesforce: Understanding the Layers That Protect Your Data
Sathish Kumar Velayudam
Sathish Kumar Velayudam
Sathish Kumar Velayudam
Follow
Jan 6
Data Security in Salesforce: Understanding the Layers That Protect Your Data
#
salesforce
#
security
#
admin
#
datasecurity
Comments
Add Comment
8 min read
Autonomous Agents Visiting Data
Patricia Buendia
Patricia Buendia
Patricia Buendia
Follow
Dec 3 '25
Autonomous Agents Visiting Data
#
devchallenge
#
googlekagglechallenge
#
aiagents
#
datasecurity
Comments
Add Comment
3 min read
Quantum Cryptography: The Future of Unbreakable Security
Manikandan Mariappan
Manikandan Mariappan
Manikandan Mariappan
Follow
Nov 11 '25
Quantum Cryptography: The Future of Unbreakable Security
#
cybersecurity
#
datasecurity
#
quantum
#
technology
Comments
Add Comment
3 min read
Data Breaches from Messaging Apps: 2020–2024 — Lessons for a Safer Digital Future
Secninjaz
Secninjaz
Secninjaz
Follow
Oct 24 '25
Data Breaches from Messaging Apps: 2020–2024 — Lessons for a Safer Digital Future
#
cybersecurity
#
privacy
#
messaging
#
datasecurity
Comments
Add Comment
3 min read
Why Data Sanitization is a Must-Have for Ethical AI
Naveen Kolli
Naveen Kolli
Naveen Kolli
Follow
Sep 25 '25
Why Data Sanitization is a Must-Have for Ethical AI
#
security
#
datasecurity
#
sanitization
Comments
Add Comment
5 min read
Why Public AI Tools Like ChatGPT Are Dangerous for Sensitive Legal Work and How Law Firms Can Protect Client Data
Josh Lee
Josh Lee
Josh Lee
Follow
Oct 20 '25
Why Public AI Tools Like ChatGPT Are Dangerous for Sensitive Legal Work and How Law Firms Can Protect Client Data
#
ai
#
lawfirm
#
datascience
#
datasecurity
Comments
1
 comment
4 min read
Hot vs Warm vs Cold Backups: Choosing the Right Strategy
DCT Technology Pvt. Ltd.
DCT Technology Pvt. Ltd.
DCT Technology Pvt. Ltd.
Follow
Sep 11 '25
Hot vs Warm vs Cold Backups: Choosing the Right Strategy
#
webdev
#
devops
#
datasecurity
#
cloudcomputing
Comments
Add Comment
3 min read
Yes, you need to think about SOC 2 compliance even if you're a startup – Here’s why it matters early on
Josh Lee
Josh Lee
Josh Lee
Follow
Sep 30 '25
Yes, you need to think about SOC 2 compliance even if you're a startup – Here’s why it matters early on
#
cybersecurity
#
soccompliance
#
cloud
#
datasecurity
Comments
Add Comment
4 min read
Securing File Transfers with SHA-256: A Simple Yet Effective Approach
Aditya R
Aditya R
Aditya R
Follow
Aug 20 '25
Securing File Transfers with SHA-256: A Simple Yet Effective Approach
#
fileintegrity
#
sha256
#
securefiletransfer
#
datasecurity
Comments
Add Comment
4 min read
Here's what ISO 27001 Is - and Why You Should Care About Your Data Security
Josh Lee
Josh Lee
Josh Lee
Follow
Sep 15 '25
Here's what ISO 27001 Is - and Why You Should Care About Your Data Security
#
iso27001
#
cybersecurity
#
cloud
#
datasecurity
Comments
Add Comment
4 min read
Why Data Governance and AI Governance Matters
Clifford Otieno
Clifford Otieno
Clifford Otieno
Follow
Sep 15 '25
Why Data Governance and AI Governance Matters
#
discuss
#
ai
#
datasecurity
#
cyberresilience
1
 reaction
Comments
Add Comment
6 min read
A Simple Foundation for Data Security: Public-Key Encryption with OpenSSL
SeunB
SeunB
SeunB
Follow
Jul 2 '25
A Simple Foundation for Data Security: Public-Key Encryption with OpenSSL
#
cybersecurity
#
webdev
#
linux
#
datasecurity
Comments
Add Comment
3 min read
Advancements in Information Retrieval: Efficiency, Multimodality, and Security in Contemporary Computer Science Research
Ali Khan
Ali Khan
Ali Khan
Follow
Apr 25 '25
Advancements in Information Retrieval: Efficiency, Multimodality, and Security in Contemporary Computer Science Research
#
informationretrieval
#
efficientsearch
#
multimodalrecommendations
#
datasecurity
Comments
Add Comment
8 min read
What Is Data Security? A Practical Guide to Protecting Information in 2025
Syed
Syed
Syed
Follow
May 26 '25
What Is Data Security? A Practical Guide to Protecting Information in 2025
#
datasecurity
#
datasecuritymanagement
#
data
Comments
Add Comment
4 min read
Unlocking Data Governance at Scale with Databricks Unity Catalog
Anil Kumar Moka
Anil Kumar Moka
Anil Kumar Moka
Follow
Mar 16 '25
Unlocking Data Governance at Scale with Databricks Unity Catalog
#
databricks
#
datagovernance
#
lakehouse
#
datasecurity
1
 reaction
Comments
Add Comment
4 min read
The "Ghibli" Chat GPT 4.o Trend: Innovation or Intrusion?
SUVAM DAS
SUVAM DAS
SUVAM DAS
Follow
Apr 19 '25
The "Ghibli" Chat GPT 4.o Trend: Innovation or Intrusion?
#
ghibli
#
ai
#
datasecurity
#
chatgpt
6
 reactions
Comments
Add Comment
2 min read
ImmuDB: Revolutionizing Data Security and Open Source Funding
Laetitia Perraut
Laetitia Perraut
Laetitia Perraut
Follow
Mar 11 '25
ImmuDB: Revolutionizing Data Security and Open Source Funding
#
datasecurity
#
blockchaintechnology
#
opensourcefunding
Comments
Add Comment
4 min read
Unlocking the Power of Delta Lake UNIFORM in Databricks
Anil Kumar Moka
Anil Kumar Moka
Anil Kumar Moka
Follow
Mar 23 '25
Unlocking the Power of Delta Lake UNIFORM in Databricks
#
databricks
#
datamananagement
#
datasecurity
#
dataengineering
2
 reactions
Comments
Add Comment
5 min read
Staying Secure & Connected While Traveling
Krideo
Krideo
Krideo
Follow
Feb 3 '25
Staying Secure & Connected While Traveling
#
videoconferencing
#
security
#
traveling
#
datasecurity
Comments
Add Comment
1 min read
Security Update on Google Chrome Extensions
Willyam simbolon
Willyam simbolon
Willyam simbolon
Follow
Nov 14 '24
Security Update on Google Chrome Extensions
#
cybersecurity
#
datasecurity
#
malware
#
devops
1
 reaction
Comments
Add Comment
2 min read
Best Practices for Data Security in Big Data Projects
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 24 '24
Best Practices for Data Security in Big Data Projects
#
bestpractices
#
bigdata
#
datasecurity
Comments
Add Comment
6 min read
Handling Sensitive Information in Automated Processes
Richard Chamberlain
Richard Chamberlain
Richard Chamberlain
Follow
Nov 17 '24
Handling Sensitive Information in Automated Processes
#
passwordmanagement
#
datasecurity
#
automatedprocesses
#
ansibletips
Comments
Add Comment
3 min read
Understanding Batch SQL Injection: A Real-World Threat to Data Security
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Nov 4 '24
Understanding Batch SQL Injection: A Real-World Threat to Data Security
#
sql
#
sqlinjection
#
datasecurity
Comments
Add Comment
5 min read
Step-by-Step Guide for Setting Up Nextcloud with GDPR Compliance
Khuram Murad
Khuram Murad
Khuram Murad
Follow
Oct 26 '24
Step-by-Step Guide for Setting Up Nextcloud with GDPR Compliance
#
alnafi
#
nextcloud
#
datasecurity
Comments
Add Comment
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account