Yashi GoyalA Quick Guide for Data Governance Tool Selection of 2024In today’s data-driven world, businesses are generating and consuming vast amounts of information at an unprecedented pace. While this data…1d ago1
InInfoSec Write-upsbyTide FoundationIt’s cybersecurity’s kryptonite: Why are you still holding it?Decoupling authority, so a breach leaves nothing for hackers to find.2d ago3
InBootcampbyDouglas Giles, PhDThe Abject Stupidity of Two-Factor AuthenticationThinking is good. If you think well, then you can solve problems. If you don’t think, then you cause problems. The worst problems are the…Aug 6170Aug 6170
InSuperWarmbyJason MalkiEnsuring End-to-End Data Protection with Fully Homomorphic Encryption Featuring Ravi Srivatsav…I had the pleasure of interviewing Ravi Srivatsav, Co-founder and CEO of DataKrypto. Ravi is a serial entrepreneur with extensive…11h ago11h ago
Indatabricks-unity-catalog-smebyKarthik SubbaraoPath to Data Protection and Compliance with Databricks Data Intelligence PlatformAuthors: Karthik Subbarao Kiryl HalozhynSep 6Sep 6
Yashi GoyalA Quick Guide for Data Governance Tool Selection of 2024In today’s data-driven world, businesses are generating and consuming vast amounts of information at an unprecedented pace. While this data…1d ago1
InInfoSec Write-upsbyTide FoundationIt’s cybersecurity’s kryptonite: Why are you still holding it?Decoupling authority, so a breach leaves nothing for hackers to find.2d ago3
InBootcampbyDouglas Giles, PhDThe Abject Stupidity of Two-Factor AuthenticationThinking is good. If you think well, then you can solve problems. If you don’t think, then you cause problems. The worst problems are the…Aug 6170
InSuperWarmbyJason MalkiEnsuring End-to-End Data Protection with Fully Homomorphic Encryption Featuring Ravi Srivatsav…I had the pleasure of interviewing Ravi Srivatsav, Co-founder and CEO of DataKrypto. Ravi is a serial entrepreneur with extensive…11h ago
Indatabricks-unity-catalog-smebyKarthik SubbaraoPath to Data Protection and Compliance with Databricks Data Intelligence PlatformAuthors: Karthik Subbarao Kiryl HalozhynSep 6
Engr. Md. Hasan MonsurHow to Encrypt Sensitive Data Before Storage in .NET 8: A Step-by-Step ApproachIn today’s digital landscape, protecting sensitive data is paramount. This article explores a step-by-step approach to implementing…Oct 94
Divyesh JagadHow I Earned My First $100 in a Bug Bounty Program (And How You Can Too!)Let me take you on a journey — one where I turned my curiosity and a little technical know-how into my first $100. Bug bounty hunting…1d ago
InData Engineer ThingsbyAnto SemeraroProduction Database Efficiency: Browsing Security, Management and OptimizationTackling the complexities of production databases with confidence following best practices for security, query optimization, and server…Nov 11, 2023