InData Engineer ThingsbyFelix GutierrezHandling PII data with AWS DataBrew Part 1Learn how to process Personally Identifiable Information (PII) right in the AWS CloudNov 30
Nitin KumarFine-Tuning Large Language Models For Named Entity RecognitionIn this post, I summarize my experiences with fine-tuning Large Language Models for the problem of Named Entity Recognition (NER). The…Jan 254
Abu HurayraHow I Hacked Over 150k PII on a ProgramSo, well, well, well… I’m Abu Hurayra aka rootplinix maybe listened my name somewhere, I’m proudly a day-time hacker who hunts bugs to…Oct 22Oct 22
Abhijeet kumawat🛡️ Information Disclosure Vulnerability: Exposing API Keys and Tokens in a Private ProgramHello, everyone! 👋Sep 273Sep 273
InData View HousebyKrupesh DesaiData Privacy — Balancing Data Conformance and Performance for Internal Reporting.PII protection in internal reporting.Sep 11Sep 11
InData Engineer ThingsbyFelix GutierrezHandling PII data with AWS DataBrew Part 1Learn how to process Personally Identifiable Information (PII) right in the AWS CloudNov 30
Nitin KumarFine-Tuning Large Language Models For Named Entity RecognitionIn this post, I summarize my experiences with fine-tuning Large Language Models for the problem of Named Entity Recognition (NER). The…Jan 254
Abu HurayraHow I Hacked Over 150k PII on a ProgramSo, well, well, well… I’m Abu Hurayra aka rootplinix maybe listened my name somewhere, I’m proudly a day-time hacker who hunts bugs to…Oct 22
Abhijeet kumawat🛡️ Information Disclosure Vulnerability: Exposing API Keys and Tokens in a Private ProgramHello, everyone! 👋Sep 273
InData View HousebyKrupesh DesaiData Privacy — Balancing Data Conformance and Performance for Internal Reporting.PII protection in internal reporting.Sep 11
Arvind PantMasking PII (Personally Identifiable Information)As a data engineer, you’ve likely encountered databases or tables to which you do not have access without obtaining multiple approvals…May 29
Ininspiringbrilliancebypriyadarshan patilBuilding secure systems with PII Data Protection Techniques — Part IToday, storing a person’s KYC information, credit card/debit card information, or other similar sensitive details to charge for services…Feb 28, 2023