Data Security
Data Security
11
Articles
10
Writers
All About Layered Security in Healthcare
The most common tools of a multi-layered security system, in order of contact with threats, are- firewall, patch management, multi-factor authentication, and end-point protection.
Aug 4, 2022
How to Add eBPF Observability to Your Project
When it comes to integrating security, networking, and observability features, working within the Linux kernel is perfect. It is not, however, without its difficulties. Historically, developers have encountered complex architectures and difficult-to- debug abstraction layers, altered kernel source code or added modules. Both of these issues are addressed by the extended BPF (eBPF).
Jul 29, 2022
In Conversation with Liz Rice, Chief Open Source Officer at Isovalent
Liz Rice is Chief Open Source Officer with eBPF specialists Isovalent, creators of the Cilium cloud native networking, security and observability project. She was Chair of the CNCF's Technical Oversight Committee 2019-2022, and Co-Chair of KubeCon + CloudNativeCon in 2018. She is also the author of Container Security, published by O'Reilly.
Jul 29, 2022
Introduction to eBPF - Revolutionizing Linux Kernel Technology
eBPF, which stands for Extended Berkeley Packet Filter, is a technology that allows Linux programs to run code in the kernel. eBPF was previously also used to construct debugging, networking, profiling, monitoring, firewalls, and other types of programs.
Jul 29, 2022
How Will Zero Trust Change SaaS Security?
However, a good deployment of a zero-trust model can help the security team get context and insight into a fast-evolving attack surface as well as improve the user experience.
Apr 24, 2022
The Best Practices and Strategies for Microsoft 365 Security for MSPs
Microsoft 365 is a heavily encrypted platform that improves cooperation and productivity. Its data centres are secured by cutting-edge security infrastructure and systems, making direct breaches almost impossible.
Apr 19, 2022
Fighting Fraud in Supply Chain using Blockchain
While blockchain networks are built on the concept of decentralized controls, infrastructure may leave doors vulnerable to interruptions that allow unauthorized access and tampering.
Jan 10, 2022
The Transformation of the Cybersecurity Space through Blockchain Technology
The ability to track and trace the source of any threat is unprecedented in this industry. That is why it will become the go-to security technology in the near future.
Dec 8, 2021
API Security: Best Practices for Securing Data and Infrastructure
Regardless of how many APIs have been shared publicly, an organization should never lose sight of putting strong security policies upfront and managing them proactively over time.
Dec 6, 2021
Ensuring Data Security of Healthcare Information
Healthcare facilities along with their business affiliates should equalize conserving patient secrecy while providing excellent patient care, also fulfilling the rigorous regulatory laws put forward by HIPAA and several different legislation, like the EU?s General Data Protection Regulation.
Nov 22, 2021
Why Is Data Security So Important In This Digital Age?
Data security is highly important in the digital ecosystem, given the extensive amounts of data churned out every day and the possible threats from cyberattacks and hackers.
Oct 22, 2021

Top Writers