#cybersecurity-1
Read more stories on Hashnode
Articles with this tag
In today's data-driven world, ensuring compliance with data privacy regulations like the General Data Protection Regulation (GDPR) is critical for...
DefectDojo is an open-source platform designed for DevSecOps, ASPM (Application Security Process Management), vulnerability management, and more. This...
I stumbled upon this website, https://www.w3resource.com/python-exercises/cybersecurity/, and found a bunch of cybersecurity puzzles to solve using...
I am learning about the basics of creating a blueprint for a secure CI/CD pipeline. Recently, I had the opportunity to implement secret scanning using...
AWS S3 buckets provide a convenient and scalable solution for storing and accessing data in the cloud. However, if not properly secured, they can be...
My plan to tackle this assessment as someone with no prior GRC (Governance, risk management, and compliance) related experience. ยท As part of my role in...