TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Data Security
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sarthak Varshney (3)
Monica Rathbun (2)
Kaveendra Dhilhan (1)
Rajeev Kumar (1)
Douglas Wagner (1)
Vijay Yadav (1)
Abhishek Dhoriya (1)
Jake Creasy (1)
Gajendra Jangid (1)
Mukesh Kumar (1)
John Godel (1)
Mahesh Chand (1)
Mark Pelf (1)
Lalit Bansal (1)
Nikhil Patil (1)
Nitesh Jha (1)
Ziggy Rafiq (1)
Mohamed Azarudeen Z (1)
Naimish Makwana (1)
Mudita Rathore (1)
Afzaal Ahmad Zeeshan (1)
Veena Sarda (1)
Joshy George (1)
Related resources for Data Security
No resource found
Best Practices for Microsoft 365 Admins when User Offboarding
10/22/2024 8:39:45 AM.
Learn how to effectively manage user accounts, ensure data security, and maintain compliance while revoking access. Implementing structured workflows and documentation will streamline the process, min
What is Alibaba Cloud Object Storage Service (OSS)
10/8/2024 3:55:37 AM.
Discover Alibaba Cloud OSS, scalable and secure cloud storage for unstructured data, offering high durability, cost-effectiveness, and global accessibility.
Mask an Aadhar Number into Blocks of 4 Digits Each
7/30/2024 5:51:41 AM.
This C# code demonstrates how to mask sensitive numbers, like Aadhar or account numbers. It validates input length, uses StringBuilder to format Aadhar numbers with spaces, and shows account number ma
Impact of Quantum Computing on Data Security
7/17/2024 12:15:07 PM.
Explore the transformative effects of quantum computing on data security in this insightful study. Delve into the potential vulnerabilities posed by quantum algorithms to traditional encryption method
What is Sanitization in Angular: Ensuring Safe Data Handling
7/15/2024 5:24:52 PM.
This article delves into the importance of sanitization, how Angular implements it to protect against XSS attacks, and best practices for maintaining data integrity and security.
What is TDS Endpoint and How to Enable TDS in Dynamics 365 Customer Engagement/CRM Online?
7/8/2024 7:35:22 PM.
TDS (Tabular Data Stream) is pivotal for accessing Dataverse data securely in Dynamics 365 CE and Power Platform. It integrates with SSMS and Power BI, ensuring native security while enabling robust r
Digitial Transformation in Healthcare: The Role of IT Solutions
7/4/2024 4:38:22 AM.
This article explores how IT solutions like AI, blockchain, IoT, and telemedicine are driving digital transformation in healthcare, improving patient care, and enhancing operational efficiency.
Transparent Data Encryption (TDE) in SQL Server
7/1/2024 7:04:40 AM.
Transparent Data Encryption (TDE) in SQL Server encrypts data at rest, ensuring database and log file protection against unauthorized access. TDE uses a database encryption key (DEK), secured by a cer
Authentication And Authorization In ASP.NET Core MVC Using Cookie
6/20/2024 10:12:07 AM.
Security is the main concern of modern applications because anyone can steal your data if it is not secured. So, if you are going to create an application where the data security is a primary concern,
The Future of Data Security: Tokenization
6/20/2024 6:54:22 AM.
Tokenization offers advanced data security by replacing sensitive information with unique tokens, enhancing usability without compromising protection. Unlike encryption and hashing, tokenization ensur
Generating Public/Private Keys In C# And .NET
6/14/2024 10:40:14 AM.
How to generate public/private key in C#. Asymmetric cryptography also known as public-key encryption uses a public/private key pair to encrypt and decrypt data. In .NET, the RSACryptoServiceProvider
How to introduce AI technologies into a medium-sized office (May 2024)
6/2/2024 9:59:26 AM.
Introducing AI to a medium-sized office involves a strategic approach. Conduct a needs assessment, select appropriate AI applications, train staff, pilot the technology, ensure data security, assess c
The Role Of Blockchain As A Service In The Tech Industry
5/7/2024 11:29:45 AM.
Blockchain as a Service (BaaS) revolutionizes tech by offering scalable, secure, and transparent solutions. It enhances industries like finance, healthcare, and supply chain with decentralized data ma
Alibaba Cloud IoT: Connecting Devices and Managing Data
4/19/2024 4:52:48 AM.
Alibaba Cloud IoT connects devices & manages data for businesses, enabling them to unlock the power of #IoT & gain valuable insights.
Alibaba Cloud Security Best Practices for Safeguarding Your Data
4/14/2024 5:24:57 AM.
Secure your data on Alibaba Cloud! Learn best practices for encryption, access control, & threat detection to ensure data security & compliance. #AlibabaCloudSecurity
Embedding Power BI Report in SharePoint Online
4/3/2024 4:09:21 AM.
Learn how to seamlessly integrate Power BI reports into SharePoint Online with our step-by-step guide. Unlock the power of data visualization and collaboration in a Microsoft 365 environment. Follow a
Static Data Masking (SSMS 18.0 Preview)
3/28/2024 6:31:38 AM.
Static Data Masking in SSMS 18.0 Preview enhances data security by obscuring sensitive information in databases. It safeguards privacy during testing by replacing real data with masked values, ensurin
How To Get Started With Always Encrypted For Beginners - Part Three
3/28/2024 6:26:32 AM.
Discover advanced techniques in data security with Always Encrypted in Microsoft SQL Server. Part Three of our beginner's guide delves deeper into encryption keys, transparent data encryption, and
How To Secure PII Data In SQL Server Using CLE (Column Level Encryption)
3/6/2024 10:45:53 AM.
PII (personally identifiable information) which is used to identify individual identity such as SSN, DOB, Bank Account Number etc. When you are working with financial application you face the scenario
C# Security: Best Practices for Secure Coding
8/31/2023 5:05:34 PM.
In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to
Unpacking Azure's Storage Account Options: Which One is Right for You?⚡
5/5/2023 7:11:55 AM.
This article is a comprehensive guide to the different types of storage accounts available in Azure. It covers everything from general-purpose v2 storage accounts to specialized blob, file, queue, tab
Various Ways To Secure Sensitive Data In C#
2/13/2023 5:43:29 AM.
In this article we will see Various ways to secure sensitive data in C# with example.
OData Security Guidance in ASP.Net Web API
6/22/2017 4:41:42 AM.
This article explains OData Security Guidance. It gives some security options that we can use when we expose a dataset using ODATA.
Hashing Passwords In .NET Core With Tips
6/8/2016 12:11:08 AM.
In this article you will learn about how to hash passwords in .NET Core with tips.
Musings on "Employee on Cloud"
3/9/2015 11:41:14 PM.
The article discusses the concept of work from anywhere and whether it is already here but has still not gained popular ground.
Simple Password Encryption Program
10/31/2006 7:22:11 AM.
This article shows you how to make a simple password encryption program.