Verity SystemsWhy Data Destruction is Vital for IP ProtectionIn today’s knowledge-driven economy, intellectual property (IP) is the cornerstone of a company’s competitive edge. Trade secrets…4 min read·14 hours ago--
Anto SemeraroinData Engineer ThingsProduction Database Efficiency: Browsing Security, Management and OptimizationTackling the complexities of production databases with confidence following best practices for security, query optimization, and server…·9 min read·Nov 11, 2023--
Inderjit RanainMicrosoft AzureMicrosoft Fabric — Data Sharing between Data Engineering, Data Analyst and Data Science TeamsMicrosoft Fabric is an end to end analytics platform with capabilities for Data Engineers, Data Analysts as well as Data Scientists. A…11 min read·Apr 28, 2024----
James CavalloXSS Attacks: advanced techniques to bypass data sanitizationDisclaimer: this tutorial is for education purposes only. I am not liable if you do something illegal with these techniques. I just think…6 min read·Nov 4, 2023----
Jose-Luis AgundezData Security Risks: stop burying the head in the sandSafeguarding sensitive data or any data asset is a hot topic, as digital transformation accelerates businesses operations, but also leads…3 min read·1 day ago----
Verity SystemsWhy Data Destruction is Vital for IP ProtectionIn today’s knowledge-driven economy, intellectual property (IP) is the cornerstone of a company’s competitive edge. Trade secrets…4 min read·14 hours ago--
Anto SemeraroinData Engineer ThingsProduction Database Efficiency: Browsing Security, Management and OptimizationTackling the complexities of production databases with confidence following best practices for security, query optimization, and server…·9 min read·Nov 11, 2023--
Inderjit RanainMicrosoft AzureMicrosoft Fabric — Data Sharing between Data Engineering, Data Analyst and Data Science TeamsMicrosoft Fabric is an end to end analytics platform with capabilities for Data Engineers, Data Analysts as well as Data Scientists. A…11 min read·Apr 28, 2024--
James CavalloXSS Attacks: advanced techniques to bypass data sanitizationDisclaimer: this tutorial is for education purposes only. I am not liable if you do something illegal with these techniques. I just think…6 min read·Nov 4, 2023--
Jose-Luis AgundezData Security Risks: stop burying the head in the sandSafeguarding sensitive data or any data asset is a hot topic, as digital transformation accelerates businesses operations, but also leads…3 min read·1 day ago--
Mudra PatelData Engineering concepts: Part 9, Data SecurityThis is Part 9 of my 10 part series of Data Engineering concepts. And in this part, we will discuss about Data Security.7 min read·Apr 8, 2024--1
Srinath SridharanBlockchain in Healthcare: A New Era of Data Security and ComplianceIntroduction·4 min read·11 hours ago--
Tamás PolgárinDeveloper rantsSo much for Snapchat’s security!My face when I accidentally hack into someone’s account… but it just happened! What sort of idiots are developing Snapchat? Here’s why you…3 min read·Jun 27, 2023--7