Sha Md. NayeemforCloudify DevOpsnayeem.hashnode.net·Jan 20, 2023How I secured sensitive information in GitLab environment variable and made the pipeline securedWhile working on my current project, I was facing some issues regarding GitLab CI/CD values which were getting exposed in the pipeline logs. I was looking for a solution and found that it can be achieved with the variable "masked" option. I wanted to...Discuss·1 like·89 readsGitLab
Senthil NayaganforSenthil Nayagansenthilnayagan.hashnode.net·Jul 22, 2022Envelope EncryptionWhat is envelope encryption? When we encrypt our data using an encryption key, it is protected, but we also need to protect that encryption key. Envelope encryption is the method of first encrypting plaintext data using a data key and then encrypting...Discuss·32 readsenvelope encryption
David SudiforSudi Davidsudidavid.hashnode.net·Oct 24, 2022Understanding RAID and Erasure CodingSecuring data and ensuring its availability is a vital consideration in any organization. Data has become a vital resource in the modern world. data is at the center of everything from promoting better decision making to improving service delivery. t...Discuss·48 readsERASURE CODING
Swaleha ParvinforTech Bytesswaleha.hashnode.net·Apr 11, 2023Ethics of Data Collection and Privacy in the Digital Age: A Developer's PerspectiveIn the digital age, data collection and privacy have become hot-button issues. As technology continues to advance, companies and governments are collecting more personal data than ever before. As developers, we have a responsibility to consider the e...Discuss2Articles1Week
badik dokforbadikdok1203.hashnode.net·Feb 27, 202312 Software Tools for Digitizing Your CompanyEvery company is different, but there are certain software tools that can be helpful for digitizing most businesses. In this blog post, we'll share 12 of the best software tools for digitizing your company. From customer relationship management (CRM)...DiscussBackup Software
PrakashforAWS & Devops Ponderingsprakashvb.hashnode.net·Feb 22, 2023Detect and Protect sensitive data in AWS CloudWatch Logs'One of the key features of Amazon CloudWatch Logs is the ability to store and monitor logs securely. Users can configure log data to be encrypted at rest using AWS Key Management Service (KMS) to ensure that sensitive data is protected. As an experi...DiscussAWS
Harrison BaneforHarrisonhbane1203.hashnode.net·Jan 26, 2023Ensuring Data Security in Federal Organizations and BeyondIn recent years, data security has become a top priority for federal organizations. With the proliferation of digital information, protecting sensitive data from cyberattacks is more important than ever. While there are many steps that federal organi...DiscussData Protection
Sha Md. NayeemforCloudify DevOpsnayeem.hashnode.net·Jan 20, 2023How I secured sensitive information in GitLab environment variable and made the pipeline securedWhile working on my current project, I was facing some issues regarding GitLab CI/CD values which were getting exposed in the pipeline logs. I was looking for a solution and found that it can be achieved with the variable "masked" option. I wanted to...Discuss·1 like·89 readsGitLab
Adams EchwaforAPI GUYadamsechwa.hashnode.net·Jan 11, 2023API Security: Best Practices for Protecting Your DataAPIs, or Application Programming Interfaces, are a key component of modern software development, allowing different systems and applications to communicate and exchange data with each other. However, as APIs facilitate the flow of sensitive data, it ...DiscussAPIs
SAJJAD BAGHERI BABA AHMADIfordigital-forensics.hashnode.net·Oct 28, 2022Practical Applications of WatermarkingThe most usage of digital watermark is in field of protecting copyright, identifying criminals and military purposes. The digital watermark can be used in military and police organizations or in medical centers with reasonable cost. Digital waterma...Discuss·32 readswatermarking
David SudiforSudi Davidsudidavid.hashnode.net·Oct 24, 2022Understanding RAID and Erasure CodingSecuring data and ensuring its availability is a vital consideration in any organization. Data has become a vital resource in the modern world. data is at the center of everything from promoting better decision making to improving service delivery. t...Discuss·48 readsERASURE CODING
AdrianforAdrian's CyberSecurity blog |adrianjanula.hashnode.net·Sep 29, 2022What should you know about Hashing & Encryption?In today's world, where information begins to be worth a lot, in a world where danger lurks at every step in the form of data leakage, hacking into systems and databases, encryption and hashing are standard. Although there are exceptions to the rule,...Discuss·27 reads#cybersecurity
Senthil NayaganforSenthil Nayagansenthilnayagan.hashnode.net·Jul 22, 2022Envelope EncryptionWhat is envelope encryption? When we encrypt our data using an encryption key, it is protected, but we also need to protect that encryption key. Envelope encryption is the method of first encrypting plaintext data using a data key and then encrypting...Discuss·32 readsenvelope encryption