DEV Community

yayabobi profile picture

yayabobi

404 bio not found

Joined Joined on  twitter website
Top 10 Snyk Alternatives for Code Security

Top 10 Snyk Alternatives for Code Security

1
Comments
8 min read
The Ultimate Guide to Cyber Resilience

The Ultimate Guide to Cyber Resilience

Comments
9 min read
The Complete Guide to Smishing (SMS Phishing)

The Complete Guide to Smishing (SMS Phishing)

Comments
9 min read
AWS FTR (Foundational Technical Review) Checklist [XLS Download]

AWS FTR (Foundational Technical Review) Checklist [XLS Download]

Comments
5 min read
Top 10 Data Discovery Tools by Type

Top 10 Data Discovery Tools by Type

Comments
7 min read
A Step-by-Step Guide to a Cloud Migration Strategy that Saves Your Money

A Step-by-Step Guide to a Cloud Migration Strategy that Saves Your Money

Comments
6 min read
A Step-by-Step Guide to Cloud Identity Management

A Step-by-Step Guide to Cloud Identity Management

Comments
7 min read
The Comprehensive Guide to Fraud Detection, Management, and Analysis

The Comprehensive Guide to Fraud Detection, Management, and Analysis

Comments
12 min read
Top 7 Requirements for Successful Attack Surface Management

Top 7 Requirements for Successful Attack Surface Management

Comments
8 min read
3 Data Observability Tools

3 Data Observability Tools

Comments
3 min read
Top 10 CNAPP Software Vendors for 2023

Top 10 CNAPP Software Vendors for 2023

Comments
7 min read
The InfoSec Guide to Data Loss Prevention

The InfoSec Guide to Data Loss Prevention

Comments
13 min read
Top 15 DevSecOps Tools that Accelerate Development

Top 15 DevSecOps Tools that Accelerate Development

Comments
11 min read
Top 7 Infrastructure as Code Open-Source Tools for 2023

Top 7 Infrastructure as Code Open-Source Tools for 2023

Comments
10 min read
8 Surprising Ways to Reduce Snowflake Costs

8 Surprising Ways to Reduce Snowflake Costs

Comments
8 min read
A Step-by-Step Guide to Brand Hijacking Attacks and How to Prevent Them

A Step-by-Step Guide to Brand Hijacking Attacks and How to Prevent Them

Comments
7 min read
How to Setup Semgrep Rules for Optimal SAST Scanning

How to Setup Semgrep Rules for Optimal SAST Scanning

Comments
7 min read
The Effective Guide to Creating a Content Security Policy

The Effective Guide to Creating a Content Security Policy

Comments
8 min read
Free PCI Compliance Checklist Download [XLS Template]

Free PCI Compliance Checklist Download [XLS Template]

Comments
7 min read
The Ultimate DevOps Guide to Terraform Import

The Ultimate DevOps Guide to Terraform Import

1
Comments
10 min read
How to Plan Your Annual Data Management Budget

How to Plan Your Annual Data Management Budget

1
Comments
5 min read
CIEM vs. CSPM: What is it and Which do I Need?

CIEM vs. CSPM: What is it and Which do I Need?

1
Comments
6 min read
10 Essential Steps for Web Application Security Testing

10 Essential Steps for Web Application Security Testing

1
Comments
8 min read
Top 7 Data Replication Tools

Top 7 Data Replication Tools

Comments
6 min read
4 Essential Tips for Data Management

4 Essential Tips for Data Management

Comments
6 min read
The InfoSec Essential Guide to Vulnerability Management

The InfoSec Essential Guide to Vulnerability Management

Comments
10 min read
5 Threat Detection and Response Methods Baffling Cyber Attackers

5 Threat Detection and Response Methods Baffling Cyber Attackers

Comments
6 min read
8 Essential Tips to Build a Big Data Pipeline that Scales

8 Essential Tips to Build a Big Data Pipeline that Scales

Comments
6 min read
Azure Security vs. AWS Security: Which Cloud is More Secure?

Azure Security vs. AWS Security: Which Cloud is More Secure?

1
Comments
8 min read
How to Optimize the DevOps Pipeline Through Developer Workflows

How to Optimize the DevOps Pipeline Through Developer Workflows

Comments
5 min read
10 Essential Steps to Improve Your AWS Cloud Security Today

10 Essential Steps to Improve Your AWS Cloud Security Today

Comments
6 min read
The DevOps Guide to AWS Security Tools

The DevOps Guide to AWS Security Tools

Comments
9 min read
NPM Audit: 5 Ways to Use it to Protect Your Code

NPM Audit: 5 Ways to Use it to Protect Your Code

2
Comments
8 min read
The 6 Essentials for Real-Time Data Streaming Architecture

The 6 Essentials for Real-Time Data Streaming Architecture

Comments
6 min read
Clone Phishing Attacks: 3 Ways To Protect Your Organization

Clone Phishing Attacks: 3 Ways To Protect Your Organization

1
Comments
7 min read
8 Steps to Prevent Whaling Phishing Attacks

8 Steps to Prevent Whaling Phishing Attacks

1
Comments
8 min read
21 Sentences That Mean Your Startup Is in Trouble

21 Sentences That Mean Your Startup Is in Trouble

4
Comments
12 min read
7 Must-Have Steps for Production Debugging in Any Language

7 Must-Have Steps for Production Debugging in Any Language

1
Comments
6 min read
Web Application Security: What to Consider for 2023

Web Application Security: What to Consider for 2023

1
Comments
8 min read
The Fundamental Guide to Compliance Management Systems

The Fundamental Guide to Compliance Management Systems

Comments
6 min read
A Step-by-step Guide to the SBOM Executive Order

A Step-by-step Guide to the SBOM Executive Order

Comments
5 min read
Debugging Node.js HTTP Requests

Debugging Node.js HTTP Requests

5
Comments
8 min read
The Developer’s Checklist to Security Hardening [XLS Download]

The Developer’s Checklist to Security Hardening [XLS Download]

Comments
8 min read
The ABCs of Identity & Access Management

The ABCs of Identity & Access Management

3
Comments
6 min read
Top 10 Continuous Security Monitoring (CSM) Tools for 2023

Top 10 Continuous Security Monitoring (CSM) Tools for 2023

2
Comments
9 min read
Real-Time Fraud Detection: 4 Methods to Protect your Online Shoppers

Real-Time Fraud Detection: 4 Methods to Protect your Online Shoppers

Comments
6 min read
How to Automate the Software Bill of Materials (SBOM)

How to Automate the Software Bill of Materials (SBOM)

1
Comments
7 min read
5 ways to limit your exposure to the new critical OpenSSL vulnerability

5 ways to limit your exposure to the new critical OpenSSL vulnerability

1
Comments
4 min read
Top 7 IoT Cyber Security Vulnerabilities for 2022

Top 7 IoT Cyber Security Vulnerabilities for 2022

3
Comments
7 min read
The Essential SDLC Security Checklist

The Essential SDLC Security Checklist

2
Comments
8 min read
5 Ways to Prevent Secrets Sprawl

5 Ways to Prevent Secrets Sprawl

1
Comments
4 min read
5 Ways SDLC Security has Changed in 2022

5 Ways SDLC Security has Changed in 2022

Comments
6 min read
Top 5 Debugging Tips for Kubernetes DaemonSet

Top 5 Debugging Tips for Kubernetes DaemonSet

1
Comments
5 min read
Your Guide to MITRE ATT&CK Framework

Your Guide to MITRE ATT&CK Framework

3
Comments
5 min read
Top 5 Most Common API Vulnerabilities You Should Know About

Top 5 Most Common API Vulnerabilities You Should Know About

2
Comments
6 min read
Top 10 Software Deployment Tools for 2022

Top 10 Software Deployment Tools for 2022

6
Comments
11 min read
8 Data Security Best Practices for SaaS Applications

8 Data Security Best Practices for SaaS Applications

2
Comments
7 min read
8 Types of Ransomware Attacks

8 Types of Ransomware Attacks

3
Comments
6 min read
Cloud Data Security: Challenges and Best Practices

Cloud Data Security: Challenges and Best Practices

6
Comments
7 min read
The Top 9 TPRM Solutions of 2022

The Top 9 TPRM Solutions of 2022

4
Comments
9 min read
loading...