Gene MarksPasswords are giving way to better security methods — until those are hacked too, that isIt’s a war that will never end. But for small-business owners, it’s all about managing risk while reaping rewardsNov 24
InTowards AIbyHussein JundiAll You Need to Know about Sensitive Data Handling Using Large Language ModelsA Step-by-Step Guide to Understand and Implement an LLM-based Sensitive Data Detection WorkflowApr 31
Engr. Md. Hasan MonsurHow to Mask Sensitive Data in .NET: A Guide to Privacy and Security Best PracticesIn “How to Mask Sensitive Data in .NET: A Guide to Privacy and Security Best Practices,” we explore crucial techniques to protect…Oct 14Oct 14
InLevel Up CodingbyAlexander S. RicciardiSecuring Sensitive Data in Java: Best Practices and Coding GuidelinesThe article explores the importance of protecting sensitive data in Java applications and highlights common vulnerabilities, including…Nov 15Nov 15
InData Engineer ThingsbyHussein JundiData Engineering: Architectures & Strategies for Handling Sensitive DataStrategies and architectures to handle sensitive data efficiently and securely according to an organization’s data maturity level.Mar 23Mar 23
Gene MarksPasswords are giving way to better security methods — until those are hacked too, that isIt’s a war that will never end. But for small-business owners, it’s all about managing risk while reaping rewardsNov 24
InTowards AIbyHussein JundiAll You Need to Know about Sensitive Data Handling Using Large Language ModelsA Step-by-Step Guide to Understand and Implement an LLM-based Sensitive Data Detection WorkflowApr 31
Engr. Md. Hasan MonsurHow to Mask Sensitive Data in .NET: A Guide to Privacy and Security Best PracticesIn “How to Mask Sensitive Data in .NET: A Guide to Privacy and Security Best Practices,” we explore crucial techniques to protect…Oct 14
InLevel Up CodingbyAlexander S. RicciardiSecuring Sensitive Data in Java: Best Practices and Coding GuidelinesThe article explores the importance of protecting sensitive data in Java applications and highlights common vulnerabilities, including…Nov 15
InData Engineer ThingsbyHussein JundiData Engineering: Architectures & Strategies for Handling Sensitive DataStrategies and architectures to handle sensitive data efficiently and securely according to an organization’s data maturity level.Mar 23
Engr. Md. Hasan MonsurHow to Use Data Annotations to Exclude Sensitive Data in .NET LogsWhile building .NET applications, I often struggled with sensitive data showing up in logs. Discovering data annotations transformed my…Oct 10
AnkitHow to Securely Store Sensitive Data in React Native and Flutter AppsStoring sensitive data on mobile apps? Discover essential techniques for securing your data in React Native and Flutter apps.Nov 14
Zhong HongPrivacy-Preserving Machine Learning: Techniques for Protecting Sensitive DataThe rise of machine learning has been nothing short of revolutionary, transforming the way we extract insights and understand the world…Apr 6