type_of
stringclasses 1
value | id
int64 12
2.31M
| title
stringlengths 1
256
⌀ | description
stringlengths 1
3.47k
⌀ | readable_publish_date
stringlengths 5
10
| slug
stringlengths 2
308
| path
stringlengths 9
316
| url
stringlengths 23
330
| comments_count
int64 -3
1.19k
| public_reactions_count
int64 -82
4.01k
| collection_id
float64 60
30.7k
⌀ | published_timestamp
stringlengths 20
20
| language
stringclasses 95
values | subforem_id
float64 1
1
⌀ | positive_reactions_count
int64 -82
4.01k
| cover_image
stringlengths 61
544
⌀ | social_image
stringlengths 61
544
| canonical_url
stringlengths 15
452
| created_at
stringlengths 20
20
| edited_at
stringlengths 20
20
⌀ | crossposted_at
stringlengths 20
20
⌀ | published_at
stringlengths 20
20
| last_comment_at
stringlengths 20
20
| reading_time_minutes
int64 0
279
| tag_list
stringlengths 5
121
| tags
stringlengths 1
111
| user
stringlengths 509
758
| organization
stringlengths 501
629
⌀ | flare_tag
stringclasses 13
values | __index_level_0__
int64 0
722k
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
article
| 1,903,644
|
Preparing for a Government Contract Audit What to Expect and How to Respond
|
Unlock the secrets to mastering a government contract audit! Get the ultimate guide on what to expect, how to prepare, and how to come out on top.
|
Jun 28 '24
|
preparing-for-a-government-contract-audit-what-to-expect-and-how-to-respond-4og0
|
/quantumcybersolution/preparing-for-a-government-contract-audit-what-to-expect-and-how-to-respond-4og0
|
https://dev.to/quantumcybersolution/preparing-for-a-government-contract-audit-what-to-expect-and-how-to-respond-4og0
| 0
| 0
| null |
2024-06-28T05:33:40Z
|
en
| null | 0
|
https://www.govcon.me/blog/preparing_for_a_government_contract_audit_what_to_expect_and_how_to_respond
|
2024-06-28T05:33:41Z
| null | null |
2024-06-28T05:33:40Z
|
2024-06-28T05:33:40Z
| 3
|
['governmentcontract', 'audit', 'compliance']
|
governmentcontract, audit, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,814
|
||
article
| 1,903,628
|
Navigating the Service Contract Act for Government Contractors
|
Understanding and complying with the Service Contract Act (SCA) is critical for government contractors. This blog post dives into the nuances, requirements, and strategic approaches to mastering the SCA landscape.
|
Jun 28 '24
|
navigating-the-service-contract-act-for-government-contractors-47hj
|
/quantumcybersolution/navigating-the-service-contract-act-for-government-contractors-47hj
|
https://dev.to/quantumcybersolution/navigating-the-service-contract-act-for-government-contractors-47hj
| 0
| 0
| null |
2024-06-28T05:13:11Z
|
en
| null | 0
|
https://www.govcon.me/blog/navigating_the_service_contract_act_for_government_contractors
|
2024-06-28T05:13:12Z
| null | null |
2024-06-28T05:13:11Z
|
2024-06-28T05:13:11Z
| 3
|
['governmentcontracts', 'servicecontractact', 'compliance']
|
governmentcontracts, servicecontractact, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,815
|
||
article
| 1,903,599
|
Navigating Office of Federal Contract Compliance Programs OFCCP Requirements
|
Unlock the secrets to navigating OFCCP requirements and ensuring your business meets federal compliance standards effortlessly.
|
Jun 28 '24
|
navigating-office-of-federal-contract-compliance-programs-ofccp-requirements-2i8h
|
/quantumcybersolution/navigating-office-of-federal-contract-compliance-programs-ofccp-requirements-2i8h
|
https://dev.to/quantumcybersolution/navigating-office-of-federal-contract-compliance-programs-ofccp-requirements-2i8h
| 0
| 0
| null |
2024-06-28T04:32:13Z
|
en
| null | 0
|
https://www.govcon.me/blog/navigating_office_of_federal_contract_compliance_programs_ofccp_requirements
|
2024-06-28T04:32:13Z
| null | null |
2024-06-28T04:32:13Z
|
2024-06-28T04:32:13Z
| 3
|
['regulations', 'compliance', 'federalcontracts']
|
regulations, compliance, federalcontracts
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,816
|
||
article
| 1,903,594
|
Navigating International Traffic in Arms Regulations ITAR in Government Contracts
|
Dive deep into the intricacies of ITAR compliance in government contracts, ensuring your projects sail smoothly while adhering to critical regulations.
|
Jun 28 '24
|
navigating-international-traffic-in-arms-regulations-itar-in-government-contracts-4ah3
|
/quantumcybersolution/navigating-international-traffic-in-arms-regulations-itar-in-government-contracts-4ah3
|
https://dev.to/quantumcybersolution/navigating-international-traffic-in-arms-regulations-itar-in-government-contracts-4ah3
| 0
| 0
| null |
2024-06-28T04:27:05Z
|
en
| null | 0
|
https://www.govcon.me/blog/navigating_international_traffic_in_arms_regulations_itar_in_government_contracts
|
2024-06-28T04:27:06Z
| null | null |
2024-06-28T04:27:05Z
|
2024-06-28T04:27:05Z
| 3
|
['itar', 'governmentcontracts', 'compliance']
|
itar, governmentcontracts, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,817
|
||
article
| 1,903,580
|
Navigating Compliance The Buy American Act and Trade Agreements Act
|
Understand the complexities and strategies involved in adhering to the Buy American Act and Trade Agreements Act for businesses engaged in government procurement.
|
Jun 28 '24
|
navigating-compliance-the-buy-american-act-and-trade-agreements-act-1oo5
|
/quantumcybersolution/navigating-compliance-the-buy-american-act-and-trade-agreements-act-1oo5
|
https://dev.to/quantumcybersolution/navigating-compliance-the-buy-american-act-and-trade-agreements-act-1oo5
| 0
| 0
| null |
2024-06-28T04:11:44Z
|
en
| null | 0
|
https://www.govcon.me/blog/navigating_compliance_the_buy_american_act_and_trade_agreements_act
|
2024-06-28T04:11:44Z
| null | null |
2024-06-28T04:11:44Z
|
2024-06-28T04:11:44Z
| 3
|
['compliance', 'globaltrade', 'governmentprocurement']
|
compliance, globaltrade, governmentprocurement
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,818
|
||
article
| 1,903,566
|
Mastering Your DCAA Audit Preparation
|
Prepare for a smooth DCAA audit journey with these advanced tips and insights tailored for tech innovators and contractors.
|
Jun 28 '24
|
mastering-your-dcaa-audit-preparation-1lom
|
/quantumcybersolution/mastering-your-dcaa-audit-preparation-1lom
|
https://dev.to/quantumcybersolution/mastering-your-dcaa-audit-preparation-1lom
| 0
| 0
| null |
2024-06-28T03:51:14Z
|
en
| null | 0
|
https://www.govcon.me/blog/mastering_your_dcaa_audit_preparation
|
2024-06-28T03:51:15Z
| null | null |
2024-06-28T03:51:14Z
|
2024-06-28T03:51:14Z
| 3
|
['dcaa', 'audit', 'governmentcontracts', 'compliance']
|
dcaa, audit, governmentcontracts, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,819
|
||
article
| 1,903,376
|
Ensuring Compliance with Export Control Regulations in Government Contracts
|
Discover how to navigate the complex landscape of export control regulations in government contracts, ensuring your projects remain compliant and successful.
|
Jun 28 '24
|
ensuring-compliance-with-export-control-regulations-in-government-contracts-26p4
|
/quantumcybersolution/ensuring-compliance-with-export-control-regulations-in-government-contracts-26p4
|
https://dev.to/quantumcybersolution/ensuring-compliance-with-export-control-regulations-in-government-contracts-26p4
| 0
| 0
| null |
2024-06-28T01:17:36Z
|
en
| null | 0
|
https://www.govcon.me/blog/ensuring_compliance_with_export_control_regulations_in_government_contracts
|
2024-06-28T01:17:37Z
| null | null |
2024-06-28T01:17:36Z
|
2024-06-28T01:17:36Z
| 3
|
['exportcontrol', 'governmentcontracts', 'compliance']
|
exportcontrol, governmentcontracts, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,820
|
||
article
| 1,903,380
|
Ensuring Compliance with Government Contract Reporting Requirements
|
In this deep dive, we explore how businesses can ensure compliance with stringent government contract reporting requirements using innovative technology solutions!
|
Jun 28 '24
|
ensuring-compliance-with-government-contract-reporting-requirements-idc
|
/quantumcybersolution/ensuring-compliance-with-government-contract-reporting-requirements-idc
|
https://dev.to/quantumcybersolution/ensuring-compliance-with-government-contract-reporting-requirements-idc
| 0
| 0
| null |
2024-06-28T01:22:43Z
|
en
| null | 0
|
https://www.govcon.me/blog/ensuring_compliance_with_government_contract_reporting_requirements
|
2024-06-28T01:22:44Z
| null | null |
2024-06-28T01:22:43Z
|
2024-06-28T01:22:43Z
| 2
|
['compliance', 'governmentcontracts', 'reporting']
|
compliance, governmentcontracts, reporting
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,821
|
||
article
| 1,903,371
|
Ensuring Compliance Key Regulations and Standards for Government Contractors
|
Dive into the regulatory landscape for government contractors, exploring the essential standards and compliance requirements to navigate this complex field successfully.
|
Jun 28 '24
|
ensuring-compliance-key-regulations-and-standards-for-government-contractors-1l9g
|
/quantumcybersolution/ensuring-compliance-key-regulations-and-standards-for-government-contractors-1l9g
|
https://dev.to/quantumcybersolution/ensuring-compliance-key-regulations-and-standards-for-government-contractors-1l9g
| 0
| 0
| null |
2024-06-28T01:12:29Z
|
en
| null | 0
|
https://www.govcon.me/blog/ensuring_compliance_key_regulations_and_standards_for_government_contractors
|
2024-06-28T01:12:29Z
| null | null |
2024-06-28T01:12:29Z
|
2024-06-28T01:12:29Z
| 3
|
['government', 'compliance', 'regulations']
|
government, compliance, regulations
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,822
|
||
article
| 1,903,357
|
Developing a Winning Government Contract Proposal Step-by-Step Guide
|
Get a detailed guide on crafting a compelling government contract proposal, from understanding RFP requirements to presenting a strong value proposition and ensuring compliance.
|
Jun 28 '24
|
developing-a-winning-government-contract-proposal-step-by-step-guide-58fd
|
/quantumcybersolution/developing-a-winning-government-contract-proposal-step-by-step-guide-58fd
|
https://dev.to/quantumcybersolution/developing-a-winning-government-contract-proposal-step-by-step-guide-58fd
| 0
| 0
| null |
2024-06-28T00:51:59Z
|
en
| null | 0
|
https://www.govcon.me/blog/developing_a_winning_government_contract_proposal_step_by_step_guide
|
2024-06-28T00:52:00Z
| null | null |
2024-06-28T00:51:59Z
|
2024-06-28T00:51:59Z
| 3
|
['governmentcontracting', 'proposaldevelopment', 'rfp', 'compliance']
|
governmentcontracting, proposaldevelopment, rfp, compliance
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,823
|
||
article
| 1,903,316
|
Developing an Effective Compliance Program for Government Contracts
|
Delve into the essentials of creating a robust compliance program tailored for government contracts, ensuring your organization meets regulatory standards effortlessly.
|
Jun 28 '24
|
developing-an-effective-compliance-program-for-government-contracts-1n5b
|
/quantumcybersolution/developing-an-effective-compliance-program-for-government-contracts-1n5b
|
https://dev.to/quantumcybersolution/developing-an-effective-compliance-program-for-government-contracts-1n5b
| 0
| 0
| null |
2024-06-28T00:16:08Z
|
en
| null | 0
|
https://www.govcon.me/blog/developing_an_effective_compliance_program_for_government_contracts
|
2024-06-28T00:16:09Z
| null | null |
2024-06-28T00:16:08Z
|
2024-06-28T00:16:08Z
| 3
|
['compliance', 'governmentcontracts', 'policy']
|
compliance, governmentcontracts, policy
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,824
|
||
article
| 1,903,298
|
Building a Robust Compliance Program for Government Contracting
|
Explore the key components of an effective compliance program, including risk assessment, policy development, training, and monitoring to ensure adherence to government regulations.
|
Jun 27 '24
|
building-a-robust-compliance-program-for-government-contracting-2ad6
|
/quantumcybersolution/building-a-robust-compliance-program-for-government-contracting-2ad6
|
https://dev.to/quantumcybersolution/building-a-robust-compliance-program-for-government-contracting-2ad6
| 0
| 0
| null |
2024-06-27T23:40:17Z
|
en
| null | 0
|
https://www.govcon.me/blog/building_a_robust_compliance_program_for_government_contracting
|
2024-06-27T23:40:18Z
| null | null |
2024-06-27T23:40:17Z
|
2024-06-27T23:40:17Z
| 2
|
['governmentcontracting', 'compliance', 'riskassessment', 'policydevelopment']
|
governmentcontracting, compliance, riskassessment, policydevelopment
|
{'name': 'Quantum Cyber Solutions', 'username': 'quantumcybersolution', 'twitter_username': None, 'github_username': None, 'user_id': 1696281, 'website_url': 'https://www.quantumcybersolutions.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1696281%2F74bbb2eb-c28a-4463-9664-bc93b5a4e7f0.png'}
| null | null | 570,825
|
||
article
| 1,851,554
|
8 Essential Components Every Dynamic Risk Assessment Must Have
|
Did you know that the number of data breaches in 2023 was a whopping 72% higher than in 2021? Static...
|
May 13 '24
|
8-essential-components-every-dynamic-risk-assessment-must-have-a2p
|
/yayabobi/8-essential-components-every-dynamic-risk-assessment-must-have-a2p
|
https://dev.to/yayabobi/8-essential-components-every-dynamic-risk-assessment-must-have-a2p
| 0
| 0
| null |
2024-05-13T15:44:02Z
|
en
| null | 0
| null |
https://cynomi.com/blog/8-essential-components-every-dynamic-risk-assessment/
|
2024-05-13T15:44:02Z
| null | null |
2024-05-13T15:44:02Z
|
2024-05-13T15:44:02Z
| 7
|
['cybersecurity', 'risk', 'compliance', 'devops']
|
cybersecurity, risk, compliance, devops
|
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png'}
| null | null | 570,826
|
|
article
| 1,817,768
|
Compliance Enforcement with Open Source Puppet
|
Establishing and maintaining a secure configuration baseline has been found in studies to be the most...
|
Apr 10 '24
|
compliance-enforcement-with-open-source-puppet-2j6d
|
/puppet/compliance-enforcement-with-open-source-puppet-2j6d
|
https://dev.to/puppet/compliance-enforcement-with-open-source-puppet-2j6d
| 0
| 1
| null |
2024-04-10T17:01:49Z
|
en
| null | 1
| null |
https://dev.to/puppet/compliance-enforcement-with-open-source-puppet-2j6d
|
2024-04-10T17:01:51Z
|
2024-04-10T17:59:01Z
| null |
2024-04-10T17:01:49Z
|
2024-04-10T17:01:49Z
| 5
|
['puppet', 'compliance', 'cis', 'benchmark']
|
puppet, compliance, cis, benchmark
|
{'name': 'Robin Tatam', 'username': 'robintatam', 'twitter_username': None, 'github_username': None, 'user_id': 1415471, 'website_url': 'https://www.puppet.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1415471%2F53c15113-2517-47ea-ae7b-0b6608606d41.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1415471%2F53c15113-2517-47ea-ae7b-0b6608606d41.jpg'}
|
{'name': 'puppet', 'username': 'puppet', 'slug': 'puppet', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2526%2F5e0e97d7-5d8b-4403-a523-0b76fe55f491.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2526%2F5e0e97d7-5d8b-4403-a523-0b76fe55f491.png'}
| null | 570,827
|
|
article
| 1,791,071
|
Compliance and Regulatory Updates for 2024
|
Businesses spanning diverse industries must prepare for the evolving landscape of rules and...
|
Mar 15 '24
|
compliance-and-regulatory-updates-for-2024-462p
|
/shivamchamoli18/compliance-and-regulatory-updates-for-2024-462p
|
https://dev.to/shivamchamoli18/compliance-and-regulatory-updates-for-2024-462p
| 0
| 0
| null |
2024-03-15T07:53:03Z
|
en
| null | 0
| null |
https://dev.to/shivamchamoli18/compliance-and-regulatory-updates-for-2024-462p
|
2024-03-15T07:53:05Z
|
2024-03-15T07:56:28Z
| null |
2024-03-15T07:53:03Z
|
2024-03-15T07:53:03Z
| 3
|
['compliance', 'regulatoryframework', 'dataprivacy', 'infosectrain']
|
compliance, regulatoryframework, dataprivacy, infosectrain
|
{'name': 'Shivam Chamoli', 'username': 'shivamchamoli18', 'twitter_username': 'shivamchamoli18', 'github_username': None, 'user_id': 930480, 'website_url': 'https://www.infosectrain.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F930480%2F231107f9-f48b-437b-9eb6-2dec4e91a3b7.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F930480%2F231107f9-f48b-437b-9eb6-2dec4e91a3b7.jpg'}
| null | null | 570,828
|
|
article
| 1,791,209
|
Don't Go Rogue: Leverage Frameworks for Effective Cloud Security Prioritization
|
While the allure of creating your own prioritization rubric for cloud security issues might be...
|
Mar 15 '24
|
dont-go-rogue-leverage-frameworks-for-effective-cloud-security-prioritization-1464
|
/public_cloud/dont-go-rogue-leverage-frameworks-for-effective-cloud-security-prioritization-1464
|
https://dev.to/public_cloud/dont-go-rogue-leverage-frameworks-for-effective-cloud-security-prioritization-1464
| 0
| 0
| null |
2024-03-15T09:38:27Z
|
en
| null | 0
| null |
https://dev.to/public_cloud/dont-go-rogue-leverage-frameworks-for-effective-cloud-security-prioritization-1464
|
2024-03-15T09:38:28Z
| null | null |
2024-03-15T09:38:27Z
|
2024-03-15T09:38:27Z
| 2
|
['devops', 'compliance', 'cloudpractitioner', 'cloudcomputing']
|
devops, compliance, cloudpractitioner, cloudcomputing
|
{'name': 'Public_Cloud', 'username': 'public_cloud', 'twitter_username': None, 'github_username': None, 'user_id': 1269370, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1269370%2F1587c70c-501f-4416-900a-49ee83f4ef1d.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1269370%2F1587c70c-501f-4416-900a-49ee83f4ef1d.png'}
| null | null | 570,829
|
|
article
| 1,773,847
|
The Complete Guide to Passing an ISO 27001 Audit
|
The question on every InfoSec professional's mind today is, "How can you protect your organization's...
|
Feb 27 '24
|
the-complete-guide-to-passing-an-iso-27001-audit-15ig
|
/yayabobi/the-complete-guide-to-passing-an-iso-27001-audit-15ig
|
https://dev.to/yayabobi/the-complete-guide-to-passing-an-iso-27001-audit-15ig
| 0
| 1
| null |
2024-02-27T16:31:41Z
|
en
| null | 1
| null |
https://cybeready.com/category/the-complete-guide-to-passing-an-iso-27001-audit
|
2024-02-27T16:31:42Z
| null | null |
2024-02-27T16:31:41Z
|
2024-02-27T16:31:41Z
| 9
|
['cybersecurity', 'compliance', 'devops']
|
cybersecurity, compliance, devops
|
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png'}
| null | null | 570,830
|
|
article
| 1,740,324
|
What is PCI-DSS Compliance Framework?
|
The protection of confidential financial data is crucial in a time when digital transactions...
|
Jan 24 '24
|
what-is-pci-dss-compliance-framework-5a8a
|
/shivamchamoli18/what-is-pci-dss-compliance-framework-5a8a
|
https://dev.to/shivamchamoli18/what-is-pci-dss-compliance-framework-5a8a
| 0
| 0
| null |
2024-01-24T16:28:06Z
|
en
| null | 0
| null |
https://dev.to/shivamchamoli18/what-is-pci-dss-compliance-framework-5a8a
|
2024-01-24T16:28:07Z
|
2024-01-24T16:28:51Z
| null |
2024-01-24T16:28:06Z
|
2024-01-24T16:28:06Z
| 3
|
['pcids', 'compliance', 'infosectrain', 'learntorise']
|
pcids, compliance, infosectrain, learntorise
|
{'name': 'Shivam Chamoli', 'username': 'shivamchamoli18', 'twitter_username': 'shivamchamoli18', 'github_username': None, 'user_id': 930480, 'website_url': 'https://www.infosectrain.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F930480%2F231107f9-f48b-437b-9eb6-2dec4e91a3b7.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F930480%2F231107f9-f48b-437b-9eb6-2dec4e91a3b7.jpg'}
| null | null | 570,831
|
|
article
| 1,766,419
|
AWS Config para análisis de seguridad
|
AWS Config puede ayudarte a alcanzar los siguientes objetivos de gobierno de seguridad: Definir...
|
Feb 20 '24
|
aws-config-para-analisis-de-seguridad-173f
|
/sjim-akt/aws-config-para-analisis-de-seguridad-173f
|
https://dev.to/sjim-akt/aws-config-para-analisis-de-seguridad-173f
| 0
| 0
| null |
2024-02-20T09:34:24Z
|
es
| null | 0
| null |
https://dev.to/sjim-akt/aws-config-para-analisis-de-seguridad-173f
|
2024-02-20T09:30:32Z
| null | null |
2024-02-20T09:34:24Z
|
2024-02-20T09:34:24Z
| 1
|
['aws', 'config', 'security', 'compliance']
|
aws, config, security, compliance
|
{'name': 'Sergio Jiménez', 'username': 'sjim-akt', 'twitter_username': 'sjimnar', 'github_username': None, 'user_id': 1183581, 'website_url': 'https://www.aktios.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1183581%2F01909f6b-345c-4832-8c52-73d8717ca184.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1183581%2F01909f6b-345c-4832-8c52-73d8717ca184.jpg'}
| null | null | 570,832
|
|
article
| 1,748,698
|
The Essential Guide to SaaS Compliance
|
The word "compliance" is one of those migraine triggers you probably don't want to hear at work. It...
|
Feb 1 '24
|
the-essential-guide-to-saas-compliance-21mh
|
/yayabobi/the-essential-guide-to-saas-compliance-21mh
|
https://dev.to/yayabobi/the-essential-guide-to-saas-compliance-21mh
| 0
| 0
| null |
2024-02-01T16:07:32Z
|
en
| null | 0
| null |
https://www.suridata.ai/blog/guide-to-saas-compliance/
|
2024-02-01T16:07:33Z
| null | null |
2024-02-01T16:07:32Z
|
2024-02-01T16:07:32Z
| 6
|
['devops', 'compliance', 'cybersecurity']
|
devops, compliance, cybersecurity
|
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png'}
| null | null | 570,833
|
|
article
| 1,709,351
|
compliance management software solutions
|
Compliance is a necessary factor that protects a company from policy violations which can cost...
|
Dec 27 '23
|
compliance-management-software-solutions-hjp
|
/ecompliance/compliance-management-software-solutions-hjp
|
https://dev.to/ecompliance/compliance-management-software-solutions-hjp
| 0
| 0
| null |
2023-12-27T09:07:52Z
|
en
| null | 0
|
https://dev.to/ecompliance/compliance-management-software-solutions-hjp
|
2023-12-27T09:07:56Z
| null | null |
2023-12-27T09:07:52Z
|
2023-12-27T09:07:52Z
| 1
|
['compliance', 'audit', 'risk', 'software']
|
compliance, audit, risk, software
|
{'name': 'ecompliance', 'username': 'ecompliance', 'twitter_username': None, 'github_username': None, 'user_id': 1242432, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1242432%2Fcf8dc70c-0602-4bc2-919b-1e90d1c8a961.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1242432%2Fcf8dc70c-0602-4bc2-919b-1e90d1c8a961.png'}
| null | null | 570,834
|
||
article
| 1,642,424
|
Why Password Complexity Rules Are Outdated: Modern Security Solutions
|
Password Complexity Rules Are Outdated In the world of cybersecurity, one question has been a...
|
Dec 2 '23
|
why-password-complexity-rules-are-outdated-modern-security-solutions-2eni
|
/simeononsecurity/why-password-complexity-rules-are-outdated-modern-security-solutions-2eni
|
https://dev.to/simeononsecurity/why-password-complexity-rules-are-outdated-modern-security-solutions-2eni
| 0
| 0
| null |
2023-12-02T02:37:04Z
|
en
| null | 0
| null |
https://simeononsecurity.com/articles/password-complexity-security-article/
|
2023-10-22T04:20:39Z
| null |
2023-12-02T02:37:04Z
|
2023-12-18T00:00:00Z
|
2023-12-18T00:00:00Z
| 3
|
['passwords', 'complexity', 'compliance', 'cybersecurity']
|
passwords, complexity, compliance, cybersecurity
|
{'name': 'simeononsecurity', 'username': 'simeononsecurity', 'twitter_username': None, 'github_username': 'simeononsecurity', 'user_id': 1180297, 'website_url': 'https://simeononsecurity.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1180297%2Fc2959899-cae1-4502-b7af-366c09b72db1.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1180297%2Fc2959899-cae1-4502-b7af-366c09b72db1.png'}
| null | null | 570,835
|
|
article
| 1,697,133
|
Deciphering the EU's AI Act - A Technical Perspective
|
The European Union's Artificial Intelligence Act imparts extensive new technical requirements for...
|
Dec 13 '23
|
deciphering-the-eus-ai-act-a-technical-perspective-38nj
|
/nilayparikh/deciphering-the-eus-ai-act-a-technical-perspective-38nj
|
https://dev.to/nilayparikh/deciphering-the-eus-ai-act-a-technical-perspective-38nj
| 0
| 1
| null |
2023-12-13T20:04:07Z
|
en
| null | 1
|
https://dev.to/nilayparikh/deciphering-the-eus-ai-act-a-technical-perspective-38nj
|
2023-12-13T20:04:07Z
|
2023-12-13T23:43:34Z
| null |
2023-12-13T20:04:07Z
|
2023-12-13T20:04:07Z
| 2
|
['ai', 'machinelearning', 'eu', 'compliance']
|
ai, machinelearning, eu, compliance
|
{'name': 'Nilay Parikh', 'username': 'nilayparikh', 'twitter_username': 'nilayparikh', 'github_username': 'nilayparikh', 'user_id': 1213066, 'website_url': 'https://www.linkedin.com/in/niparikh/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1213066%2F99063440-94be-46dd-9eed-2a1ea24e9b03.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1213066%2F99063440-94be-46dd-9eed-2a1ea24e9b03.jpeg'}
| null | null | 570,836
|
||
article
| 1,685,259
|
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents
|
The U.S. Securities and Exchange Commission (SEC) recently announced its new rules for public...
|
Dec 1 '23
|
understanding-the-new-sec-rules-for-disclosing-cybersecurity-incidents-3e1
|
/alvinslee/understanding-the-new-sec-rules-for-disclosing-cybersecurity-incidents-3e1
|
https://dev.to/alvinslee/understanding-the-new-sec-rules-for-disclosing-cybersecurity-incidents-3e1
| 0
| 1
| null |
2023-12-01T16:13:42Z
|
en
| null | 1
|
https://dzone.com/articles/understanding-the-new-sec-rules-for-disclosing-cyb
|
2023-12-01T16:12:00Z
| null | null |
2023-12-01T16:13:42Z
|
2023-12-01T16:13:42Z
| 6
|
['cybersecurity', 'compliance', 'cloud']
|
cybersecurity, compliance, cloud
|
{'name': 'Alvin Lee', 'username': 'alvinslee', 'twitter_username': None, 'github_username': 'alvinslee', 'user_id': 579432, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F579432%2F7fa8b4ec-dd50-4096-9013-b11933e1cd94.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F579432%2F7fa8b4ec-dd50-4096-9013-b11933e1cd94.jpeg'}
| null | null | 570,837
|
||
article
| 1,682,417
|
Top GRC Trends for 2024 and Beyond
|
GRC professionals are essential in assisting organizations to grow and thrive while controlling risks...
|
Nov 29 '23
|
top-grc-trends-for-2024-and-beyond-3iin
|
/shivamchamoli18/top-grc-trends-for-2024-and-beyond-3iin
|
https://dev.to/shivamchamoli18/top-grc-trends-for-2024-and-beyond-3iin
| 0
| 0
| null |
2023-11-29T10:00:53Z
|
en
| null | 0
| null |
https://dev.to/shivamchamoli18/top-grc-trends-for-2024-and-beyond-3iin
|
2023-11-29T10:00:54Z
| null | null |
2023-11-29T10:00:53Z
|
2023-11-29T10:00:53Z
| 3
|
['grc', 'governance', 'riskmanagement', 'compliance']
|
grc, governance, riskmanagement, compliance
|
{'name': 'Shivam Chamoli', 'username': 'shivamchamoli18', 'twitter_username': 'shivamchamoli18', 'github_username': None, 'user_id': 930480, 'website_url': 'https://www.infosectrain.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F930480%2F231107f9-f48b-437b-9eb6-2dec4e91a3b7.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F930480%2F231107f9-f48b-437b-9eb6-2dec4e91a3b7.jpg'}
| null | null | 570,838
|
|
article
| 1,656,256
|
GDPR Compliance: Consent Management with SlashID
|
Introduction At SlashID we make it easy for you to collect, store and process user data...
|
Nov 3 '23
|
gdpr-compliance-consent-management-with-slashid-51io
|
/vincenzoiozzo/gdpr-compliance-consent-management-with-slashid-51io
|
https://dev.to/vincenzoiozzo/gdpr-compliance-consent-management-with-slashid-51io
| 0
| 1
| null |
2023-11-03T18:30:11Z
|
en
| null | 1
| null |
https://dev.to/vincenzoiozzo/gdpr-compliance-consent-management-with-slashid-51io
|
2023-11-03T18:30:11Z
| null | null |
2023-11-03T18:30:11Z
|
2023-11-03T18:30:11Z
| 3
|
['gdpr', 'compliance', 'react']
|
gdpr, compliance, react
|
{'name': 'vincenzoiozzo', 'username': 'vincenzoiozzo', 'twitter_username': None, 'github_username': 'vincenzoiozzo', 'user_id': 1001079, 'website_url': 'https://www.slashid.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1001079%2F13a09d89-d2af-4203-8ed6-bd362c2c1b89.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1001079%2F13a09d89-d2af-4203-8ed6-bd362c2c1b89.png'}
| null | null | 570,839
|
|
article
| 1,658,541
|
The InfoSec Guide to HIPAA Compliance
|
Most people think of healthcare providers' offices as a sanctuary where the only threat to safety is...
|
Nov 6 '23
|
the-infosec-guide-to-hipaa-compliance-59di
|
/yayabobi/the-infosec-guide-to-hipaa-compliance-59di
|
https://dev.to/yayabobi/the-infosec-guide-to-hipaa-compliance-59di
| 0
| 0
| null |
2023-11-06T16:20:01Z
|
en
| null | 0
| null |
https://cybeready.com/category/the-infosec-guide-to-hipaa-compliance
|
2023-11-06T16:20:02Z
| null | null |
2023-11-06T16:20:01Z
|
2023-11-06T16:20:01Z
| 10
|
['cybersecurity', 'hipaa', 'compliance', 'devops']
|
cybersecurity, hipaa, compliance, devops
|
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png'}
| null | null | 570,840
|
|
article
| 1,657,481
|
Garantindo a proteção de dados financeiros com PCI-DSS
|
O Padrão de Segurança de Dados da Indústria de Cartões de Pagamento ou PCI-DSS (Payment Card Industry...
|
Nov 5 '23
|
garantindo-a-protecao-de-dados-financeiros-com-pci-dss-4gbi
|
/raveenita/garantindo-a-protecao-de-dados-financeiros-com-pci-dss-4gbi
|
https://dev.to/raveenita/garantindo-a-protecao-de-dados-financeiros-com-pci-dss-4gbi
| 0
| 0
| null |
2023-11-05T13:53:04Z
|
pt
| null | 0
|
https://dev.to/raveenita/garantindo-a-protecao-de-dados-financeiros-com-pci-dss-4gbi
|
2023-11-05T13:53:05Z
|
2023-11-05T13:55:15Z
| null |
2023-11-05T13:53:04Z
|
2023-11-05T13:53:04Z
| 2
|
['security', 'compliance']
|
security, compliance
|
{'name': 'Geovana Ribeiro(AKA Raveenita)', 'username': 'raveenita', 'twitter_username': None, 'github_username': 'raveenita', 'user_id': 233426, 'website_url': 'https://raveenita.github.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F233426%2Fbbef0ff3-2cea-4bd3-b854-a283df2d37d5.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F233426%2Fbbef0ff3-2cea-4bd3-b854-a283df2d37d5.jpg'}
| null | null | 570,841
|
||
article
| 1,605,786
|
Navigating the Complex World of Compliance: Your Guide to Statutory, Legal, and Social Compliance
|
In today's rapidly evolving business environment, compliance is not merely a legal requirement; it's...
|
Sep 20 '23
|
navigating-the-complex-world-of-compliance-your-guide-to-statutory-legal-and-social-compliance-i1j
|
/osmgmt1005/navigating-the-complex-world-of-compliance-your-guide-to-statutory-legal-and-social-compliance-i1j
|
https://dev.to/osmgmt1005/navigating-the-complex-world-of-compliance-your-guide-to-statutory-legal-and-social-compliance-i1j
| 0
| 0
| null |
2023-09-20T07:38:14Z
|
en
| null | 0
| null |
https://dev.to/osmgmt1005/navigating-the-complex-world-of-compliance-your-guide-to-statutory-legal-and-social-compliance-i1j
|
2023-09-20T07:38:14Z
| null | null |
2023-09-20T07:38:14Z
|
2023-09-20T07:38:14Z
| 2
|
['consulting', 'compliance']
|
consulting, compliance
|
{'name': 'Om Sai Management Consulting Services', 'username': 'osmgmt1005', 'twitter_username': None, 'github_username': None, 'user_id': 1165789, 'website_url': 'https://www.osmgmtservices.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1165789%2Fcaaeb254-6561-4c67-81bb-78ca3d59de77.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1165789%2Fcaaeb254-6561-4c67-81bb-78ca3d59de77.jpg'}
| null | null | 570,842
|
|
article
| 1,579,145
|
The Ultimate Guide to Cyber Resilience
|
Resilience is defined by the Oxford Dictionary as "the capacity to withstand or to recover quickly...
|
Aug 24 '23
|
the-ultimate-guide-to-cyber-resilience-4dgj
|
/yayabobi/the-ultimate-guide-to-cyber-resilience-4dgj
|
https://dev.to/yayabobi/the-ultimate-guide-to-cyber-resilience-4dgj
| 0
| 0
| null |
2023-08-24T19:41:55Z
|
en
| null | 0
| null |
https://cybeready.com/category/guide-to-cyber-resilience
|
2023-08-24T19:41:55Z
| null | null |
2023-08-24T19:41:55Z
|
2023-08-24T19:41:55Z
| 9
|
['cybersecurity', 'compliance', 'devops']
|
cybersecurity, compliance, devops
|
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png'}
| null | null | 570,843
|
|
article
| 1,518,156
|
Protecting User Privacy in the Age of SSO: Legal Perspectives
|
Introduction The concept of SSO opens doors to unparalleled convenience and streamlined...
|
Jun 27 '23
|
protecting-user-privacy-in-the-age-of-sso-legal-perspectives-1h2m
|
/gorgew234/protecting-user-privacy-in-the-age-of-sso-legal-perspectives-1h2m
|
https://dev.to/gorgew234/protecting-user-privacy-in-the-age-of-sso-legal-perspectives-1h2m
| 0
| 0
| null |
2023-06-27T08:18:26Z
| null | null | 0
|
https://dev.to/gorgew234/protecting-user-privacy-in-the-age-of-sso-legal-perspectives-1h2m
|
2023-06-27T08:18:27Z
|
2023-06-27T08:19:00Z
| null |
2023-06-27T08:18:26Z
|
2023-06-27T08:18:26Z
| 2
|
['dataprivacy', 'compliance', 'singlesignon', 'identitymanagement']
|
dataprivacy, compliance, singlesignon, identitymanagement
|
{'name': 'George Wilson', 'username': 'gorgew234', 'twitter_username': 'gorgew234', 'github_username': None, 'user_id': 1068620, 'website_url': 'https://www.loginradius.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1068620%2Fccf7a09e-991b-4200-b62e-2bdefdbf7210.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1068620%2Fccf7a09e-991b-4200-b62e-2bdefdbf7210.jpg'}
| null | null | 570,844
|
||
article
| 1,491,907
|
Comply With Australian CIRMP Rules
|
If you’re an Australian organization handling critical infrastructure assets, you have less than...
|
Jun 5 '23
|
comply-with-australian-cirmp-rules-18ge
|
/sierra_cyber/comply-with-australian-cirmp-rules-18ge
|
https://dev.to/sierra_cyber/comply-with-australian-cirmp-rules-18ge
| 0
| 0
| null |
2023-06-05T04:32:42Z
| null | null | 0
| null |
https://www.cybersierra.co/comply-with-australian-cirmp-rules/
|
2023-06-05T04:32:42Z
|
2023-06-05T04:33:03Z
| null |
2023-06-05T04:32:42Z
|
2023-06-05T04:32:42Z
| 9
|
['cybersecurity', 'compliance', 'security', 'news']
|
cybersecurity, compliance, security, news
|
{'name': 'Cyber Sierra', 'username': 'sierra_cyber', 'twitter_username': 'sierra_cyber', 'github_username': None, 'user_id': 1021583, 'website_url': 'https://www.cybersierra.co/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1021583%2F848ce0c6-6d6e-4b88-b1dc-43c3b87433ce.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1021583%2F848ce0c6-6d6e-4b88-b1dc-43c3b87433ce.jpeg'}
| null |
{'name': 'news', 'bg_color_hex': '#111111', 'text_color_hex': '#fff9ac'}
| 570,845
|
|
article
| 1,524,100
|
4 Steps to Auto Remediate Account level S3 Access Settings
|
Welcome to the first blog for 2023 !! In this post, I wanted to narrate the steps involved...
|
Jul 3 '23
|
4-steps-to-auto-remediate-account-level-s3-access-settings-400k
|
/aws-builders/4-steps-to-auto-remediate-account-level-s3-access-settings-400k
|
https://dev.to/aws-builders/4-steps-to-auto-remediate-account-level-s3-access-settings-400k
| 0
| 2
| null |
2023-07-03T04:13:57Z
| null | null | 2
|
https://dev.to/aws-builders/4-steps-to-auto-remediate-account-level-s3-access-settings-400k
|
2023-07-02T21:02:16Z
|
2023-07-03T04:14:54Z
| null |
2023-07-03T04:13:57Z
|
2023-07-03T04:13:57Z
| 3
|
['aws', 'awscommunitybuilders', 'config', 'compliance']
|
aws, awscommunitybuilders, config, compliance
|
{'name': 'VijayaNirmalaGopal', 'username': 'vijayanirmalag2', 'twitter_username': 'VijayaNirmalaG2', 'github_username': 'gvnirmalaa', 'user_id': 467642, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F467642%2Fa5b2bb60-be42-4c44-8607-d2213fa8624a.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F467642%2Fa5b2bb60-be42-4c44-8607-d2213fa8624a.jpg'}
|
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png'}
| null | 570,846
|
||
article
| 1,520,778
|
Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption
|
S3(Simple Storage Service) buckets are an integral part of Amazon Web Services(AWS) and offer a...
|
Jun 29 '23
|
enhancing-s3-bucket-security-unleashing-the-power-of-dual-layer-server-side-encryption-19fn
|
/janvithakkar/enhancing-s3-bucket-security-unleashing-the-power-of-dual-layer-server-side-encryption-19fn
|
https://dev.to/janvithakkar/enhancing-s3-bucket-security-unleashing-the-power-of-dual-layer-server-side-encryption-19fn
| 0
| 1
| null |
2023-06-29T13:05:31Z
| null | null | 1
|
https://dev.to/janvithakkar/enhancing-s3-bucket-security-unleashing-the-power-of-dual-layer-server-side-encryption-19fn
|
2023-06-29T12:31:08Z
| null | null |
2023-06-29T13:05:31Z
|
2023-06-29T13:05:31Z
| 3
|
['aws', 'compliance', 'cloudcomputing', 'security']
|
aws, compliance, cloudcomputing, security
|
{'name': 'Janvi Thakkar', 'username': 'janvithakkar', 'twitter_username': None, 'github_username': 'Janvi-Thakkar', 'user_id': 849302, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F849302%2Fbce5bff5-37b0-41e5-8684-3418461f6644.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F849302%2Fbce5bff5-37b0-41e5-8684-3418461f6644.jpeg'}
| null | null | 570,847
|
||
article
| 1,512,083
|
How to generate an SBOM for JavaScript and Node.js applications
|
Follow our step by step guide to generating an SBOM for JavaScript and Node.js applications using the Snyk API or CLI tool.
|
Jun 21 '23
|
how-to-generate-an-sbom-for-javascript-and-nodejs-applications-52do
|
/snyk/how-to-generate-an-sbom-for-javascript-and-nodejs-applications-52do
|
https://dev.to/snyk/how-to-generate-an-sbom-for-javascript-and-nodejs-applications-52do
| 0
| 4
| null |
2023-06-21T15:45:13Z
| null | null | 4
|
https://snyk.io/blog/generate-sbom-javascript-node-js-applications/
|
2023-06-21T15:45:13Z
| null | null |
2023-06-21T15:45:13Z
|
2023-06-21T15:45:13Z
| 11
|
['opensourcesecurity', 'compliance', 'javascript', 'node']
|
opensourcesecurity, compliance, javascript, node
|
{'name': 'SnykSec', 'username': 'snyk_sec', 'twitter_username': None, 'github_username': 'GeraldCrescione', 'user_id': 921082, 'website_url': 'https://snyk.co/dev.to', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F921082%2F72453ff1-d259-408e-bcc9-397b713e77c5.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F921082%2F72453ff1-d259-408e-bcc9-397b713e77c5.png'}
|
{'name': 'Snyk', 'username': 'snyk', 'slug': 'snyk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F1215%2Ffe4be452-1e68-444a-bf77-db21bf3a7bdc.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F1215%2Ffe4be452-1e68-444a-bf77-db21bf3a7bdc.png'}
| null | 570,848
|
||
article
| 1,456,048
|
Syncfusion’s Bold Reports is Now SOC 2 Type 2 Compliance Certified!
|
Syncfusion’s Bold Reports is Now SOC 2 Type 2 Compliance Certified! Syncfusion’s Bold Reports is...
|
May 3 '23
|
syncfusions-bold-reports-is-now-soc-2-type-2-compliance-certified-4m9c
|
/boldreports/syncfusions-bold-reports-is-now-soc-2-type-2-compliance-certified-4m9c
|
https://dev.to/boldreports/syncfusions-bold-reports-is-now-soc-2-type-2-compliance-certified-4m9c
| 0
| 1
| null |
2023-05-03T12:16:00Z
|
en
| null | 1
|
https://www.boldreports.com/blog/syncfusion-bold-reports-is-now-soc-2-type-2-compliance-certified
|
2023-05-03T12:13:04Z
|
2024-03-08T06:54:48Z
| null |
2023-05-03T12:16:00Z
|
2023-05-03T12:16:00Z
| 2
|
['compliance', 'security', 'soc2type2']
|
compliance, security, soc2type2
|
{'name': 'BarbraWeke', 'username': 'barbraweke', 'twitter_username': 'barbra_wek74424', 'github_username': 'BarbraWeke', 'user_id': 1055562, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1055562%2F20dc5197-7712-4a81-a716-0493a72aa06c.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1055562%2F20dc5197-7712-4a81-a716-0493a72aa06c.jpeg'}
|
{'name': 'Bold Reports', 'username': 'boldreports', 'slug': 'boldreports', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6810%2Fe33a8cbe-071a-4ef2-bb50-40882a9d4661.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6810%2Fe33a8cbe-071a-4ef2-bb50-40882a9d4661.png'}
| null | 570,849
|
||
article
| 1,455,718
|
Navigating Data Privacy and Regulation
|
Introduction As our world becomes more connected, the importance of data privacy and regulation...
|
May 3 '23
|
navigating-data-privacy-and-regulation-1n90
|
/techscopeblog/navigating-data-privacy-and-regulation-1n90
|
https://dev.to/techscopeblog/navigating-data-privacy-and-regulation-1n90
| 0
| 0
| null |
2023-05-03T06:09:49Z
| null | null | 0
| null |
https://www.techscope.info/cloud/navigating-data-privacy-and-regulation-a-comprehensive-guide/
|
2023-05-03T06:09:49Z
| null | null |
2023-05-03T06:09:49Z
|
2023-05-03T06:09:49Z
| 4
|
['ccpa', 'compliance', 'dataprivacy', 'dataprotection']
|
ccpa, compliance, dataprivacy, dataprotection
|
{'name': 'TechScope Blog', 'username': 'techscopeblog', 'twitter_username': 'TechScopeBlog', 'github_username': 'TechScopeBlog', 'user_id': 1070240, 'website_url': 'https://broth.hu/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1070240%2Fd2af50d4-c010-4421-a6a3-7db3ef48aebf.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1070240%2Fd2af50d4-c010-4421-a6a3-7db3ef48aebf.jpg'}
| null | null | 570,850
|
|
article
| 1,447,592
|
Mastering Cloud Governance Compliance: A Comprehensive Guide
|
Introduction In the era of digital transformation, organizations are increasingly leveraging cloud...
|
Apr 25 '23
|
mastering-cloud-governance-compliance-a-comprehensive-guide-5bc7
|
/techscopeblog/mastering-cloud-governance-compliance-a-comprehensive-guide-5bc7
|
https://dev.to/techscopeblog/mastering-cloud-governance-compliance-a-comprehensive-guide-5bc7
| 0
| 0
| null |
2023-04-25T12:06:26Z
| null | null | 0
| null |
https://www.techscope.info/cloud/mastering-cloud-governance-compliance-a-comprehensive-guide/
|
2023-04-25T12:06:26Z
| null | null |
2023-04-25T12:06:26Z
|
2023-04-25T12:06:26Z
| 4
|
['cloudgovernance', 'cloudsecurity', 'cloudstrategy', 'compliance']
|
cloudgovernance, cloudsecurity, cloudstrategy, compliance
|
{'name': 'TechScope Blog', 'username': 'techscopeblog', 'twitter_username': 'TechScopeBlog', 'github_username': 'TechScopeBlog', 'user_id': 1070240, 'website_url': 'https://broth.hu/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1070240%2Fd2af50d4-c010-4421-a6a3-7db3ef48aebf.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1070240%2Fd2af50d4-c010-4421-a6a3-7db3ef48aebf.jpg'}
| null | null | 570,851
|
|
article
| 1,401,813
|
Build license management into your pipelines
|
Below is more or less my FOSS Backstage (lightning) talk, titled "Build license management into your...
|
Mar 15 '23
|
build-license-management-into-your-pipelines-6bg
|
/floord/build-license-management-into-your-pipelines-6bg
|
https://dev.to/floord/build-license-management-into-your-pipelines-6bg
| 0
| 3
| null |
2023-03-15T11:37:36Z
|
en
| null | 3
|
https://dev.to/floord/build-license-management-into-your-pipelines-6bg
|
2023-03-15T11:37:36Z
| null | null |
2023-03-15T11:37:36Z
|
2023-03-15T11:37:36Z
| 6
|
['devops', 'cicd', 'opensource', 'compliance']
|
devops, cicd, opensource, compliance
|
{'name': 'Floor Drees', 'username': 'floord', 'twitter_username': None, 'github_username': 'FloorD', 'user_id': 344536, 'website_url': 'https://floor.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F344536%2Fb029731f-61e2-47b6-a5a1-4c32cb8dca70.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F344536%2Fb029731f-61e2-47b6-a5a1-4c32cb8dca70.jpg'}
| null | null | 570,852
|
||
article
| 1,376,669
|
GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance
|
Cybersecurity is an indispensable requirement for businesses today. With the uptick of cybercrimes...
|
Feb 23 '23
|
grc-in-cyber-security-5-reasons-to-consolidate-cyber-security-governance-risk-compliance-and-insurance-10dh
|
/sierra_cyber/grc-in-cyber-security-5-reasons-to-consolidate-cyber-security-governance-risk-compliance-and-insurance-10dh
|
https://dev.to/sierra_cyber/grc-in-cyber-security-5-reasons-to-consolidate-cyber-security-governance-risk-compliance-and-insurance-10dh
| 0
| 1
| null |
2023-02-23T12:33:27Z
|
en
| null | 1
|
https://www.cybersierra.co/grc-in-cyber-security-5-reasons-to-consolidate-cyber-security-governance-risk-compliance-and-insurance/
|
2023-02-23T12:33:27Z
| null | null |
2023-02-23T12:33:27Z
|
2023-02-23T12:33:27Z
| 4
|
['security', 'opensource', 'cybersecurity', 'compliance']
|
security, opensource, cybersecurity, compliance
|
{'name': 'Cyber Sierra', 'username': 'sierra_cyber', 'twitter_username': 'sierra_cyber', 'github_username': None, 'user_id': 1021583, 'website_url': 'https://www.cybersierra.co/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1021583%2F848ce0c6-6d6e-4b88-b1dc-43c3b87433ce.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1021583%2F848ce0c6-6d6e-4b88-b1dc-43c3b87433ce.jpeg'}
| null | null | 570,853
|
||
article
| 1,359,155
|
Write AWS Config rules using cfn-guard
|
AWS Config rules allow you to determine if a resource is compliant or not. Previously when you wanted...
|
Feb 9 '23
|
write-aws-config-rules-using-cfn-guard-46a4
|
/aws-builders/write-aws-config-rules-using-cfn-guard-46a4
|
https://dev.to/aws-builders/write-aws-config-rules-using-cfn-guard-46a4
| 0
| 3
| null |
2023-02-09T07:08:44Z
|
en
| null | 3
|
https://binx.io/2022/11/25/write-aws-config-rules/
|
2023-02-09T07:08:44Z
| null | null |
2023-02-09T07:08:44Z
|
2023-02-09T07:08:44Z
| 3
|
['cfnguard', 'awsconfig', 'compliance', 'security']
|
cfnguard, awsconfig, compliance, security
|
{'name': 'Joris Conijn', 'username': 'nr18', 'twitter_username': 'jorisconijn', 'github_username': 'Nr18', 'user_id': 986511, 'website_url': 'https://conijn.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F986511%2F2a6b38b5-bdd4-4528-9d45-404657392ae2.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F986511%2F2a6b38b5-bdd4-4528-9d45-404657392ae2.jpeg'}
|
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png'}
| null | 570,854
|
||
article
| 1,348,403
|
Releasing code in large corporations is slow - and there is a good reason for it
|
Working on products in large corporations can be frustrating. Your code could be complete for months and the product still can't be released because of compliance needs. This can feel like a hindrance, but it also is important to protect our users
|
Jan 31 '23
|
releasing-code-in-large-corporations-is-slow-and-there-is-a-good-reason-for-it-4e86
|
/codepo8/releasing-code-in-large-corporations-is-slow-and-there-is-a-good-reason-for-it-4e86
|
https://dev.to/codepo8/releasing-code-in-large-corporations-is-slow-and-there-is-a-good-reason-for-it-4e86
| 3
| 13
| null |
2023-01-31T17:50:54Z
|
en
| null | 13
|
https://christianheilmann.com/2023/01/31/releasing-code-in-large-corporations-is-slow-and-there-is-a-good-reason-for-it/
|
2023-01-31T17:50:47Z
| null | null |
2023-01-31T17:50:54Z
|
2023-06-25T16:27:03Z
| 4
|
['compliance', 'software', 'development']
|
compliance, software, development
|
{'name': 'Christian Heilmann', 'username': 'codepo8', 'twitter_username': 'codepo8', 'github_username': 'codepo8', 'user_id': 110884, 'website_url': 'https://christianheilmann.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F110884%2Fc4807448-b7fe-4d8d-ba13-a3ec4c97b377.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F110884%2Fc4807448-b7fe-4d8d-ba13-a3ec4c97b377.jpeg'}
| null | null | 570,855
|
||
article
| 1,341,742
|
What Is SOC 2 Type 2 Compliance?
|
summary What you need to know about SOC 2 cloud compliance and how to shore up security without...
|
Mar 18 '23
|
what-is-soc-2-type-2-compliance-3fle
|
/duplocloud/what-is-soc-2-type-2-compliance-3fle
|
https://dev.to/duplocloud/what-is-soc-2-type-2-compliance-3fle
| 2
| 0
| null |
2023-03-18T05:59:02Z
|
en
| null | 0
|
https://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fi0.wp.com%2Fduplocloud.com%2Fwp-content%2Fuploads%2F2023%2F01%2Fwhat-is-soc-2-type-2-compliance.jpg%3Fw%3D640%26ssl%3D1
|
https://media2.dev.to/dynamic/image/width=1000,height=500,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fi0.wp.com%2Fduplocloud.com%2Fwp-content%2Fuploads%2F2023%2F01%2Fwhat-is-soc-2-type-2-compliance.jpg%3Fw%3D640%26ssl%3D1
|
https://duplocloud.com/blog/soc-2-type-2-compliance/
|
2023-01-26T01:21:31Z
|
2023-03-18T05:59:08Z
|
2023-03-18T05:59:02Z
|
2023-01-25T21:28:23Z
|
2024-08-21T03:03:22Z
| 5
|
['compliance', 'devops', 'security']
|
compliance, devops, security
|
{'name': 'Zach Gover', 'username': 'zgover', 'twitter_username': 'ZachWGover', 'github_username': 'zgover', 'user_id': 848561, 'website_url': 'https://aglyn.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg'}
|
{'name': 'DuploCloud', 'username': 'duplocloud', 'slug': 'duplocloud', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png'}
| null | 570,856
|
article
| 1,332,946
|
What is Policy-as-Code? An Introduction to Open Policy Agent
|
In the cloud-native era, we often hear that "security is job zero", which means it's even more...
|
Jan 18 '23
|
what-is-policy-as-code-an-introduction-to-open-policy-agent-fm1
|
/gitguardian/what-is-policy-as-code-an-introduction-to-open-policy-agent-fm1
|
https://dev.to/gitguardian/what-is-policy-as-code-an-introduction-to-open-policy-agent-fm1
| 0
| 0
| 21,462
|
2023-01-18T09:58:01Z
|
en
| null | 0
|
https://blog.gitguardian.com/what-is-policy-as-code-an-introduction-to-open-policy-agent/
|
2023-01-18T09:55:01Z
| null | null |
2023-01-18T09:58:01Z
|
2023-01-18T09:58:01Z
| 5
|
['cloud', 'compliance', 'devops']
|
cloud, compliance, devops
|
{'name': 'Thomas Segura', 'username': 'segudev', 'twitter_username': None, 'github_username': 'segudev', 'user_id': 141347, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F141347%2Fb91f2fe0-45b4-43a1-8002-190823082da8.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F141347%2Fb91f2fe0-45b4-43a1-8002-190823082da8.png'}
|
{'name': 'GitGuardian', 'username': 'gitguardian', 'slug': 'gitguardian', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F4775%2Fc847a31e-0f21-49f1-a6fe-7b55c0e0c954.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F4775%2Fc847a31e-0f21-49f1-a6fe-7b55c0e0c954.png'}
| null | 570,857
|
||
article
| 1,302,521
|
The Fundamental Guide to Compliance Management Systems
|
Although many elements make up a compliance management system, they can be broken down into three...
|
Dec 19 '22
|
the-fundamental-guide-to-compliance-management-systems-360g
|
/yayabobi/the-fundamental-guide-to-compliance-management-systems-360g
|
https://dev.to/yayabobi/the-fundamental-guide-to-compliance-management-systems-360g
| 0
| 0
| null |
2022-12-19T17:31:11Z
|
en
| null | 0
| null |
https://cybeready.com/guide-to-compliance-management-systems
|
2022-12-19T17:31:12Z
| null | null |
2022-12-19T17:31:11Z
|
2022-12-19T17:31:11Z
| 6
|
['cybersecurity', 'compliance', 'governanc', 'management']
|
cybersecurity, compliance, governanc, management
|
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png'}
| null | null | 570,858
|
|
article
| 1,296,327
|
A Step-by-step Guide to the SBOM Executive Order
|
2020 was the year that our lives were turned upside down, but it also hosted another memorable event:...
|
Dec 14 '22
|
a-step-by-step-guide-to-the-sbom-executive-order-2bne
|
/yayabobi/a-step-by-step-guide-to-the-sbom-executive-order-2bne
|
https://dev.to/yayabobi/a-step-by-step-guide-to-the-sbom-executive-order-2bne
| 0
| 0
| null |
2022-12-14T16:45:42Z
|
en
| null | 0
| null |
https://www.ox.security/guide-to-the-sbom-executive-order/
|
2022-12-14T16:45:43Z
| null | null |
2022-12-14T16:45:42Z
|
2022-12-14T16:45:42Z
| 5
|
['sbom', 'cybersecurity', 'compliance', 'devops']
|
sbom, cybersecurity, compliance, devops
|
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png'}
| null | null | 570,859
|
|
article
| 1,245,955
|
Detecting suspicious login activity
|
In today's world, security is one of the most important components of any modern application. To...
|
Nov 7 '22
|
detecting-suspicious-login-activity-5b77
|
/bunkosecurity/detecting-suspicious-login-activity-5b77
|
https://dev.to/bunkosecurity/detecting-suspicious-login-activity-5b77
| 0
| 3
| null |
2022-11-07T00:27:24Z
|
en
| null | 3
| null |
https://www.bunko.dev/blog/detecting-suspicious-login-activity
|
2022-11-07T00:01:14Z
| null | null |
2022-11-07T00:27:24Z
|
2022-11-07T00:27:24Z
| 7
|
['security', 'compliance', 'javascript', 'tutorial']
|
security, compliance, javascript, tutorial
|
{'name': 'Tomas', 'username': 'bunko_security', 'twitter_username': 'bunko_security', 'github_username': None, 'user_id': 960509, 'website_url': 'https://www.bunko.dev/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F960509%2Fea1b74a8-bdbc-4b69-a035-35e87027b665.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F960509%2Fea1b74a8-bdbc-4b69-a035-35e87027b665.jpg'}
|
{'name': 'Bunko Security', 'username': 'bunkosecurity', 'slug': 'bunkosecurity', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6232%2F28b1c5fa-7941-4bc8-8f9b-ee770e19b229.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6232%2F28b1c5fa-7941-4bc8-8f9b-ee770e19b229.png'}
| null | 570,860
|
|
article
| 1,255,386
|
Deeper dive into SBOM
|
Deep dive into SBOM
|
Dec 9 '22
|
deeper-dive-into-sbom-4ca9
|
/pawelpiwosz/deeper-dive-into-sbom-4ca9
|
https://dev.to/pawelpiwosz/deeper-dive-into-sbom-4ca9
| 0
| 1
| 20,428
|
2022-12-09T19:42:20Z
|
en
| null | 1
|
https://dev.to/pawelpiwosz/deeper-dive-into-sbom-4ca9
|
2022-11-13T16:50:42Z
| null | null |
2022-12-09T19:42:20Z
|
2022-12-09T19:42:20Z
| 3
|
['sbom', 'cybersecurity', 'compliance', 'process']
|
sbom, cybersecurity, compliance, process
|
{'name': 'Paweł Piwosz', 'username': 'pawelpiwosz', 'twitter_username': 'pawelpiwosz', 'github_username': 'pawelpiwosz', 'user_id': 664647, 'website_url': 'https://www.pawelpiwosz.net/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png'}
| null | null | 570,861
|
||
article
| 1,286,476
|
sanctions.io - Sanctions & AML screening made simple
|
A simple, reliable, and cost-effective solution for your Sanctions & AML screening process. ...
|
Dec 6 '22
|
sanctionsio-sanctions-aml-screening-made-simple-4acp
|
/sanctionsio/sanctionsio-sanctions-aml-screening-made-simple-4acp
|
https://dev.to/sanctionsio/sanctionsio-sanctions-aml-screening-made-simple-4acp
| 0
| 0
| null |
2022-12-06T22:00:59Z
|
en
| null | 0
| null |
https://dev.to/sanctionsio/sanctionsio-sanctions-aml-screening-made-simple-4acp
|
2022-12-06T22:00:59Z
| null | null |
2022-12-06T22:00:59Z
|
2022-12-06T22:00:59Z
| 1
|
['screening', 'saas', 'aml', 'compliance']
|
screening, saas, aml, compliance
|
{'name': 'Thorsten J. Gorny', 'username': 'sanctionsio', 'twitter_username': 'gorny_j', 'github_username': None, 'user_id': 985597, 'website_url': 'https://www.sanctions.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F985597%2Ffcfcea33-6af6-4b78-805e-2532ea23d336.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F985597%2Ffcfcea33-6af6-4b78-805e-2532ea23d336.png'}
| null | null | 570,862
|
|
article
| 1,255,115
|
SBOM with Checkov
|
SBOM management with Checkov
|
Nov 25 '22
|
sbom-with-checkov-37ll
|
/pawelpiwosz/sbom-with-checkov-37ll
|
https://dev.to/pawelpiwosz/sbom-with-checkov-37ll
| 0
| 1
| 20,428
|
2022-11-25T09:05:50Z
|
en
| null | 1
|
https://dev.to/pawelpiwosz/sbom-with-checkov-37ll
|
2022-11-13T11:05:10Z
| null | null |
2022-11-25T09:05:50Z
|
2022-11-25T09:05:50Z
| 3
|
['sbom', 'cybersecurity', 'compliance', 'process']
|
sbom, cybersecurity, compliance, process
|
{'name': 'Paweł Piwosz', 'username': 'pawelpiwosz', 'twitter_username': 'pawelpiwosz', 'github_username': 'pawelpiwosz', 'user_id': 664647, 'website_url': 'https://www.pawelpiwosz.net/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png'}
| null | null | 570,863
|
||
article
| 1,254,169
|
SBOM with Anchore
|
SBOM management with Anchore
|
Nov 18 '22
|
sbom-with-anchore-309i
|
/pawelpiwosz/sbom-with-anchore-309i
|
https://dev.to/pawelpiwosz/sbom-with-anchore-309i
| 0
| 0
| 20,428
|
2022-11-18T11:23:18Z
|
en
| null | 0
|
https://dev.to/pawelpiwosz/sbom-with-anchore-309i
|
2022-11-12T15:12:52Z
| null | null |
2022-11-18T11:23:18Z
|
2022-11-18T11:23:18Z
| 3
|
['sbom', 'cybersecurity', 'compliance', 'process']
|
sbom, cybersecurity, compliance, process
|
{'name': 'Paweł Piwosz', 'username': 'pawelpiwosz', 'twitter_username': 'pawelpiwosz', 'github_username': 'pawelpiwosz', 'user_id': 664647, 'website_url': 'https://www.pawelpiwosz.net/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png'}
| null | null | 570,864
|
||
article
| 1,253,121
|
SBOM with FOSSology
|
SBOM management with FOSSology
|
Nov 16 '22
|
sbom-with-fossology-4327
|
/pawelpiwosz/sbom-with-fossology-4327
|
https://dev.to/pawelpiwosz/sbom-with-fossology-4327
| 0
| 5
| 20,428
|
2022-11-16T23:26:03Z
|
en
| null | 5
|
https://dev.to/pawelpiwosz/sbom-with-fossology-4327
|
2022-11-11T17:28:52Z
| null | null |
2022-11-16T23:26:03Z
|
2022-11-16T23:26:03Z
| 3
|
['sbom', 'cybersecurity', 'compliance', 'process']
|
sbom, cybersecurity, compliance, process
|
{'name': 'Paweł Piwosz', 'username': 'pawelpiwosz', 'twitter_username': 'pawelpiwosz', 'github_username': 'pawelpiwosz', 'user_id': 664647, 'website_url': 'https://www.pawelpiwosz.net/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png'}
| null | null | 570,865
|
||
article
| 1,245,797
|
SBOM with VulnerableCode.io
|
The tool to check vulnerabilities - VulnerableCode
|
Nov 15 '22
|
sbom-with-vulnerablecodeio-3kag
|
/pawelpiwosz/sbom-with-vulnerablecodeio-3kag
|
https://dev.to/pawelpiwosz/sbom-with-vulnerablecodeio-3kag
| 0
| 5
| 20,428
|
2022-11-15T21:50:15Z
|
en
| null | 5
|
https://dev.to/pawelpiwosz/sbom-with-vulnerablecodeio-3kag
|
2022-11-06T19:51:31Z
|
2022-11-16T10:58:28Z
| null |
2022-11-15T21:50:15Z
|
2022-11-15T21:50:15Z
| 4
|
['sbom', 'cybersecurity', 'compliance', 'process']
|
sbom, cybersecurity, compliance, process
|
{'name': 'Paweł Piwosz', 'username': 'pawelpiwosz', 'twitter_username': 'pawelpiwosz', 'github_username': 'pawelpiwosz', 'user_id': 664647, 'website_url': 'https://www.pawelpiwosz.net/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png'}
| null | null | 570,866
|
||
article
| 1,244,629
|
What is SBOM
|
What are SBOMs
|
Nov 14 '22
|
what-is-sbom-19pc
|
/pawelpiwosz/what-is-sbom-19pc
|
https://dev.to/pawelpiwosz/what-is-sbom-19pc
| 0
| 1
| 20,428
|
2022-11-14T11:38:50Z
|
en
| null | 1
|
https://dev.to/pawelpiwosz/what-is-sbom-19pc
|
2022-11-05T15:10:36Z
| null | null |
2022-11-14T11:38:50Z
|
2022-11-14T11:38:50Z
| 4
|
['sbom', 'cybersecurity', 'compliance', 'process']
|
sbom, cybersecurity, compliance, process
|
{'name': 'Paweł Piwosz', 'username': 'pawelpiwosz', 'twitter_username': 'pawelpiwosz', 'github_username': 'pawelpiwosz', 'user_id': 664647, 'website_url': 'https://www.pawelpiwosz.net/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png'}
| null | null | 570,867
|
||
article
| 1,244,630
|
SBOM with ScanCode.io
|
The tool to generate SBOM - ScanCode
|
Nov 14 '22
|
sbom-with-scancodeio-3b6a
|
/pawelpiwosz/sbom-with-scancodeio-3b6a
|
https://dev.to/pawelpiwosz/sbom-with-scancodeio-3b6a
| 0
| 0
| 20,428
|
2022-11-14T11:56:40Z
|
en
| null | 0
|
https://dev.to/pawelpiwosz/sbom-with-scancodeio-3b6a
|
2022-11-05T15:11:30Z
|
2022-11-14T12:02:50Z
| null |
2022-11-14T11:56:40Z
|
2022-11-14T11:56:40Z
| 7
|
['sbom', 'cybersecurity', 'compliance', 'process']
|
sbom, cybersecurity, compliance, process
|
{'name': 'Paweł Piwosz', 'username': 'pawelpiwosz', 'twitter_username': 'pawelpiwosz', 'github_username': 'pawelpiwosz', 'user_id': 664647, 'website_url': 'https://www.pawelpiwosz.net/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F664647%2F444c491d-4004-476d-9a95-54f8639864a2.png'}
| null | null | 570,868
|
||
article
| 1,248,172
|
Our SOC 2 compliance journey
|
⚡ Tl;dr System and Organizational Controls (SOC) is a suite of examinations performed by...
|
Nov 8 '22
|
our-soc-2-compliance-journey-14fj
|
/icepanel/our-soc-2-compliance-journey-14fj
|
https://dev.to/icepanel/our-soc-2-compliance-journey-14fj
| 0
| 3
| null |
2022-11-08T15:43:12Z
|
en
| null | 3
|
https://blog.icepanel.io/2022/10/31/our-soc2-compliance-journey
|
2022-11-08T15:43:12Z
|
2023-02-18T18:24:44Z
| null |
2022-11-08T15:43:12Z
|
2022-11-08T15:43:12Z
| 7
|
['security', 'tooling', 'compliance', 'automation']
|
security, tooling, compliance, automation
|
{'name': 'IcePanel', 'username': 'icepanel', 'twitter_username': 'ice_panel', 'github_username': None, 'user_id': 955451, 'website_url': 'http://u.icepanel.io/3d033f67', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F955451%2F6d764721-5578-4ef6-876e-0a68c3cd5df5.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F955451%2F6d764721-5578-4ef6-876e-0a68c3cd5df5.jpg'}
| null | null | 570,869
|
||
article
| 1,203,888
|
3 ways to set a dollar value on the benefits of your organization's Compliance (and security?) programs -
|
3 ways to set a dollar value on the benefits of your organization's Compliance (and security?)...
|
Sep 27 '22
|
3-ways-to-set-a-dollar-value-on-the-benefits-of-your-organizations-compliance-and-security-programs-8e0
|
/durguess/3-ways-to-set-a-dollar-value-on-the-benefits-of-your-organizations-compliance-and-security-programs-8e0
|
https://dev.to/durguess/3-ways-to-set-a-dollar-value-on-the-benefits-of-your-organizations-compliance-and-security-programs-8e0
| 0
| 0
| null |
2022-09-27T01:01:00Z
|
en
| null | 0
| null |
https://dev.to/durguess/3-ways-to-set-a-dollar-value-on-the-benefits-of-your-organizations-compliance-and-security-programs-8e0
|
2022-09-27T00:48:12Z
|
2022-09-27T01:35:49Z
| null |
2022-09-27T01:01:00Z
|
2022-09-27T01:01:00Z
| 2
|
['security', 'compliance', 'cybersecurity', 'soc2']
|
security, compliance, cybersecurity, soc2
|
{'name': 'Durgesh Shukla', 'username': 'durguess', 'twitter_username': 'Durgesh88193638', 'github_username': None, 'user_id': 930161, 'website_url': 'https://www.linkedin.com/in/shukladurgesh/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F930161%2Fb895c454-6916-4f5a-adff-df6205978512.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F930161%2Fb895c454-6916-4f5a-adff-df6205978512.jpg'}
| null | null | 570,870
|
|
article
| 1,236,422
|
The Digital Services Act (DSA) and How it Could Change Everything
|
What is the Digital Services Act? The Digital Services Act (DSA) is a proposal by the...
|
Oct 30 '22
|
the-digital-services-act-dsa-and-how-it-could-change-everything-816
|
/bunkosecurity/the-digital-services-act-dsa-and-how-it-could-change-everything-816
|
https://dev.to/bunkosecurity/the-digital-services-act-dsa-and-how-it-could-change-everything-816
| 0
| 2
| null |
2022-10-30T23:05:29Z
|
en
| null | 2
| null |
https://www.bunko.dev/blog/the-digital-services-act-dsa-and-how-it-could-change-everything
|
2022-10-30T23:00:05Z
|
2022-11-03T00:43:06Z
| null |
2022-10-30T23:05:29Z
|
2022-10-30T23:05:29Z
| 5
|
['eu', 'security', 'compliance', 'news']
|
eu, security, compliance, news
|
{'name': 'Tomas', 'username': 'bunko_security', 'twitter_username': 'bunko_security', 'github_username': None, 'user_id': 960509, 'website_url': 'https://www.bunko.dev/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F960509%2Fea1b74a8-bdbc-4b69-a035-35e87027b665.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F960509%2Fea1b74a8-bdbc-4b69-a035-35e87027b665.jpg'}
|
{'name': 'Bunko Security', 'username': 'bunkosecurity', 'slug': 'bunkosecurity', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6232%2F28b1c5fa-7941-4bc8-8f9b-ee770e19b229.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6232%2F28b1c5fa-7941-4bc8-8f9b-ee770e19b229.png'}
|
{'name': 'news', 'bg_color_hex': '#111111', 'text_color_hex': '#fff9ac'}
| 570,871
|
|
article
| 1,146,005
|
Top 6 Cloud Compliance Certifications for Developers to Know in 2022
|
Cloud compliance certifications allow developers to demonstrate their technical skills and knowledge...
|
Aug 25 '22
|
top-6-cloud-compliance-certifications-for-developers-to-know-in-2022-1l45
|
/duplocloud/top-6-cloud-compliance-certifications-for-developers-to-know-in-2022-1l45
|
https://dev.to/duplocloud/top-6-cloud-compliance-certifications-for-developers-to-know-in-2022-1l45
| 0
| 0
| null |
2022-08-25T21:52:53Z
| null | null | 0
|
https://duplocloud.com/blog/cloud-compliance-certification/
|
2022-07-20T17:44:45Z
| null |
2022-08-25T21:52:53Z
|
2022-07-19T00:04:25Z
|
2022-07-19T00:04:25Z
| 8
|
['cloud', 'cloudservices', 'compliance', 'aws']
|
cloud, cloudservices, compliance, aws
|
{'name': 'Zach Gover', 'username': 'zgover', 'twitter_username': 'ZachWGover', 'github_username': 'zgover', 'user_id': 848561, 'website_url': 'https://aglyn.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg'}
|
{'name': 'DuploCloud', 'username': 'duplocloud', 'slug': 'duplocloud', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png'}
| null | 570,872
|
||
article
| 1,163,342
|
The 4 Best Cloud Compliance Tools for Startups & SMBs
|
Stay on top of the latest regulations and keep your data secure with these helpful tools Security...
|
Aug 20 '22
|
the-4-best-cloud-compliance-tools-for-startups-smbs-5046
|
/duplocloud/the-4-best-cloud-compliance-tools-for-startups-smbs-5046
|
https://dev.to/duplocloud/the-4-best-cloud-compliance-tools-for-startups-smbs-5046
| 0
| 0
| null |
2022-08-20T10:08:13Z
|
en
| null | 0
|
https://duplocloud.com/blog/cloud-compliance-tools/
|
2022-08-09T19:20:17Z
|
2022-08-20T10:17:15Z
|
2022-08-20T10:08:13Z
|
2022-08-09T15:59:49Z
|
2022-08-09T15:59:49Z
| 6
|
['cloud', 'compliance', 'cicd']
|
cloud, compliance, cicd
|
{'name': 'Zach Gover', 'username': 'zgover', 'twitter_username': 'ZachWGover', 'github_username': 'zgover', 'user_id': 848561, 'website_url': 'https://aglyn.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg'}
|
{'name': 'DuploCloud', 'username': 'duplocloud', 'slug': 'duplocloud', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png'}
| null | 570,873
|
||
article
| 1,163,490
|
Are You Spending Too Much on DevOps?
|
The DevOps function in an organization is responsible for deploying, securing and maintaining...
|
Aug 9 '22
|
are-you-spending-too-much-on-devops-5bjc
|
/duplocloud/are-you-spending-too-much-on-devops-5bjc
|
https://dev.to/duplocloud/are-you-spending-too-much-on-devops-5bjc
| 0
| 4
| null |
2022-08-09T23:19:08Z
|
en
| null | 4
|
https://duplocloud.com/blog/are-you-spending-too-much-on-devops/
|
2022-08-09T23:07:19Z
|
2022-08-09T23:19:40Z
|
2022-08-09T23:19:08Z
|
2022-08-09T20:13:55Z
|
2022-08-09T20:13:55Z
| 5
|
['devops', 'compliance', 'cicd']
|
devops, compliance, cicd
|
{'name': 'Zach Gover', 'username': 'zgover', 'twitter_username': 'ZachWGover', 'github_username': 'zgover', 'user_id': 848561, 'website_url': 'https://aglyn.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg'}
|
{'name': 'DuploCloud', 'username': 'duplocloud', 'slug': 'duplocloud', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png'}
| null | 570,874
|
||
article
| 1,147,323
|
How Courier Became HIPAA Compliant
|
When thinking about handling PII (Personally Identifiable Information) for SaaS companies, standards...
|
Jul 21 '22
|
how-courier-became-hipaa-compliant-135b
|
/courier/how-courier-became-hipaa-compliant-135b
|
https://dev.to/courier/how-courier-became-hipaa-compliant-135b
| 0
| 4
| null |
2022-07-21T15:55:02Z
|
en
| null | 4
|
https://www.courier.com/blog/how-courier-became-hipaa-compliant/
|
2022-07-21T04:46:26Z
|
2022-09-28T05:00:56Z
| null |
2022-07-21T15:55:02Z
|
2022-07-21T15:55:02Z
| 4
|
['security', 'compliance', 'hipaa', 'cybersecurity']
|
security, compliance, hipaa, cybersecurity
|
{'name': 'Aman', 'username': 'aman_kandola', 'twitter_username': None, 'github_username': 'Rarlegend', 'user_id': 514094, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F514094%2Ffa963339-9081-4a16-866a-672ffe43319a.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F514094%2Ffa963339-9081-4a16-866a-672ffe43319a.png'}
|
{'name': 'Courier', 'username': 'courier', 'slug': 'courier', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3288%2Fd7c19ec0-5176-496e-b68e-d0e11b23b5aa.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3288%2Fd7c19ec0-5176-496e-b68e-d0e11b23b5aa.png'}
| null | 570,875
|
||
article
| 1,127,512
|
Practical steps using AWS Organization
|
Scenario where you have to manage several accounts in your company being the Cloud...
|
Jun 29 '22
|
practical-steps-using-aws-organization-1d8
|
/damdev95/practical-steps-using-aws-organization-1d8
|
https://dev.to/damdev95/practical-steps-using-aws-organization-1d8
| 1
| 4
| null |
2022-06-29T16:01:10Z
| null | null | 4
|
https://dev.to/damdev95/practical-steps-using-aws-organization-1d8
|
2022-06-29T11:59:39Z
| null | null |
2022-06-29T16:01:10Z
|
2023-01-16T03:13:16Z
| 3
|
['aws', 'cloud', 'compliance']
|
aws, cloud, compliance
|
{'name': 'Sulaiman Olubiyi ', 'username': 'damdev95', 'twitter_username': None, 'github_username': 'Damdev-95', 'user_id': 768082, 'website_url': 'https://github.com/Damdev-95', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F768082%2F91930d41-e83c-4aa4-8e58-839609bca53c.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F768082%2F91930d41-e83c-4aa4-8e58-839609bca53c.jpeg'}
| null | null | 570,876
|
||
article
| 1,094,502
|
How to get ready for the German Supply Chain Due Diligence Act (GSDDA) requirements?
|
You must have read these recent headlines which grabbed the eyeballs of CPOs and the supply chain...
|
May 24 '22
|
how-to-get-ready-for-the-german-supply-chain-due-diligence-act-gsdda-requirements-49d3
|
/aavenir/how-to-get-ready-for-the-german-supply-chain-due-diligence-act-gsdda-requirements-49d3
|
https://dev.to/aavenir/how-to-get-ready-for-the-german-supply-chain-due-diligence-act-gsdda-requirements-49d3
| 0
| 3
| null |
2022-05-24T11:40:49Z
| null | null | 3
|
https://dev.to/aavenir/how-to-get-ready-for-the-german-supply-chain-due-diligence-act-gsdda-requirements-49d3
|
2022-05-24T11:33:28Z
| null | null |
2022-05-24T11:40:49Z
|
2022-05-24T11:40:49Z
| 2
|
['supplychain', 'contractmanagement', 'compliance']
|
supplychain, contractmanagement, compliance
|
{'name': 'Aavenir', 'username': 'aavenir', 'twitter_username': 'AavenirInfo', 'github_username': None, 'user_id': 643273, 'website_url': 'https://aavenir.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F643273%2F83b02888-4bc8-4e33-b9f2-50c53317751e.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F643273%2F83b02888-4bc8-4e33-b9f2-50c53317751e.png'}
| null | null | 570,877
|
||
article
| 1,119,787
|
Security and Compliance in the Cloud — Do it Right the First Time!
|
Startups that need compliance must follow a growing number of security standards — SOC 2, ISO 27001,...
|
Jun 20 '22
|
security-and-compliance-in-the-cloud-do-it-right-the-first-time-368i
|
/duplocloud/security-and-compliance-in-the-cloud-do-it-right-the-first-time-368i
|
https://dev.to/duplocloud/security-and-compliance-in-the-cloud-do-it-right-the-first-time-368i
| 2
| 0
| null |
2022-06-20T20:34:03Z
| null | null | 0
| null |
https://duplocloud.com/blog/security-and-compliance-in-the-cloud-do-it-right-the-first-time/
|
2022-06-20T20:28:36Z
| null |
2022-06-20T20:34:03Z
|
2022-02-02T02:09:00Z
|
2022-07-11T15:12:15Z
| 6
|
['compliance', 'security', 'gdpr', 'hipaa']
|
compliance, security, gdpr, hipaa
|
{'name': 'Zach Gover', 'username': 'zgover', 'twitter_username': 'ZachWGover', 'github_username': 'zgover', 'user_id': 848561, 'website_url': 'https://aglyn.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg'}
|
{'name': 'DuploCloud', 'username': 'duplocloud', 'slug': 'duplocloud', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png'}
| null | 570,878
|
|
article
| 1,119,780
|
DuploCloud Case Study: Customer Achieves Frictionless Migration to AWS
|
CLAIM YOUR AWS ACTIVATE OFFER HERE! Introduction The customer connected with DuploCloud...
|
Jun 20 '22
|
duplocloud-case-study-customer-achieves-frictionless-migration-to-aws-cfe
|
/duplocloud/duplocloud-case-study-customer-achieves-frictionless-migration-to-aws-cfe
|
https://dev.to/duplocloud/duplocloud-case-study-customer-achieves-frictionless-migration-to-aws-cfe
| 0
| 1
| null |
2022-06-20T20:32:58Z
| null | null | 1
| null |
https://duplocloud.com/blog/duplocloud-case-study-customer-achieves-frictionless-migration-to-aws/
|
2022-06-20T20:28:34Z
| null |
2022-06-20T20:32:58Z
|
2020-11-11T17:50:00Z
|
2020-11-11T17:50:00Z
| 6
|
['cloudservices', 'compliance', 'security', 'datamigration']
|
cloudservices, compliance, security, datamigration
|
{'name': 'Zach Gover', 'username': 'zgover', 'twitter_username': 'ZachWGover', 'github_username': 'zgover', 'user_id': 848561, 'website_url': 'https://aglyn.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg'}
|
{'name': 'DuploCloud', 'username': 'duplocloud', 'slug': 'duplocloud', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png'}
| null | 570,879
|
|
article
| 1,119,777
|
Agility And Security: How To Get Both In Your Cloud
|
Gartner’s hype cycle for new technologies has proven accurate many times over, and cloud technologies...
|
Jun 20 '22
|
agility-and-security-how-to-get-both-in-your-cloud-fge
|
/duplocloud/agility-and-security-how-to-get-both-in-your-cloud-fge
|
https://dev.to/duplocloud/agility-and-security-how-to-get-both-in-your-cloud-fge
| 0
| 0
| null |
2022-06-20T20:32:35Z
| null | null | 0
| null |
https://duplocloud.com/blog/agility-and-security-how-to-get-both-in-your-cloud/
|
2022-06-20T20:28:33Z
| null |
2022-06-20T20:32:35Z
|
2020-08-01T16:33:00Z
|
2020-08-01T16:33:00Z
| 7
|
['compliance', 'security', 'alerting', 'compliancereports']
|
compliance, security, alerting, compliancereports
|
{'name': 'Zach Gover', 'username': 'zgover', 'twitter_username': 'ZachWGover', 'github_username': 'zgover', 'user_id': 848561, 'website_url': 'https://aglyn.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg'}
|
{'name': 'DuploCloud', 'username': 'duplocloud', 'slug': 'duplocloud', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png'}
| null | 570,880
|
|
article
| 1,119,776
|
Hyper-converged DevOps: How To Avoid Death By a Thousand Cuts
|
In the last two decades we have seen the emergence of new computing models, a new discipline called...
|
Jun 20 '22
|
hyper-converged-devops-how-to-avoid-death-by-a-thousand-cuts-13en
|
/duplocloud/hyper-converged-devops-how-to-avoid-death-by-a-thousand-cuts-13en
|
https://dev.to/duplocloud/hyper-converged-devops-how-to-avoid-death-by-a-thousand-cuts-13en
| 0
| 0
| null |
2022-06-20T20:32:26Z
| null | null | 0
| null |
https://duplocloud.com/blog/hyper-converged-devops-how-to-avoid-death-by-a-thousand-cuts/
|
2022-06-20T20:28:33Z
| null |
2022-06-20T20:32:26Z
|
2020-07-20T16:29:00Z
|
2020-07-20T16:29:00Z
| 8
|
['cloudservices', 'compliance', 'devops', 'security']
|
cloudservices, compliance, devops, security
|
{'name': 'Zach Gover', 'username': 'zgover', 'twitter_username': 'ZachWGover', 'github_username': 'zgover', 'user_id': 848561, 'website_url': 'https://aglyn.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F848561%2F6a6fbdd9-e505-4a77-ae07-d7855e43d9f6.jpeg'}
|
{'name': 'DuploCloud', 'username': 'duplocloud', 'slug': 'duplocloud', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5799%2F48ee00b1-e5ae-4743-b637-b1f934b978cd.png'}
| null | 570,881
|
|
article
| 1,074,466
|
What is a Data Subject Access Request (DSAR) And Why You Should Care?
|
In a security landscape defined by regular high-profile breaches compromising individual data -...
|
May 3 '22
|
what-is-a-data-subject-access-request-dsar-and-why-you-should-care-5eh5
|
/yayabobi/what-is-a-data-subject-access-request-dsar-and-why-you-should-care-5eh5
|
https://dev.to/yayabobi/what-is-a-data-subject-access-request-dsar-and-why-you-should-care-5eh5
| 0
| 3
| null |
2022-05-03T17:11:01Z
| null | null | 3
| null |
https://dev.to/yayabobi/what-is-a-data-subject-access-request-dsar-and-why-you-should-care-5eh5
|
2022-05-03T17:11:01Z
| null | null |
2022-05-03T17:11:01Z
|
2022-05-03T17:11:01Z
| 5
|
['compliance', 'cybersecurity', 'database', 'datascience']
|
compliance, cybersecurity, database, datascience
|
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png'}
| null | null | 570,882
|
|
article
| 1,100,419
|
AWS Security Stories #03: CIS Controls
|
The CIS (Center for Internet Security) is a non profit organization and its main purpose to form...
|
May 31 '22
|
aws-security-tip003-cis-controls-1cno
|
/aws-builders/aws-security-tip003-cis-controls-1cno
|
https://dev.to/aws-builders/aws-security-tip003-cis-controls-1cno
| 0
| 2
| 19,818
|
2022-05-31T06:02:31Z
| null | null | 2
| null |
https://dev.to/aws-builders/aws-security-tip003-cis-controls-1cno
|
2022-05-31T06:02:31Z
|
2022-09-23T05:55:04Z
| null |
2022-05-31T06:02:31Z
|
2022-05-31T06:02:31Z
| 5
|
['aws', 'cis', 'cloudsecurity', 'compliance']
|
aws, cis, cloudsecurity, compliance
|
{'name': 'Sedat SALMAN', 'username': 'sdtslmn', 'twitter_username': 'sdtslmn', 'github_username': 'sdtslmn', 'user_id': 869117, 'website_url': 'https://sdtslmn.blog/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F869117%2Fa462c21b-629f-4b45-95c7-3a51891b5c70.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F869117%2Fa462c21b-629f-4b45-95c7-3a51891b5c70.jpeg'}
|
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png'}
| null | 570,883
|
|
article
| 1,092,753
|
New AWS Config Rules - LambdaLess and rusty
|
AWS Config checks all your resources for compliance. With 260 managed rules, it covers a lot of...
|
May 22 '22
|
new-aws-config-rules-lambdaless-and-rusty-hbe
|
/aws-builders/new-aws-config-rules-lambdaless-and-rusty-hbe
|
https://dev.to/aws-builders/new-aws-config-rules-lambdaless-and-rusty-hbe
| 2
| 16
| null |
2022-05-22T17:24:53Z
| null | null | 16
|
https://aws-blog.de/2022/06/new-aws-config-rules-lambdaless-and-rusty.html
|
2022-05-22T15:49:50Z
|
2022-06-01T06:46:40Z
| null |
2022-05-22T17:24:53Z
|
2022-05-30T09:31:48Z
| 8
|
['aws', 'config', 'rust', 'compliance']
|
aws, config, rust, compliance
|
{'name': 'Gernot Glawe', 'username': 'megaproaktiv', 'twitter_username': 'megaproaktiv', 'github_username': 'megaproaktiv', 'user_id': 184411, 'website_url': 'https://www.go-on-aws.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F184411%2Fec0489ba-df69-481e-8d2a-f837a2a9b65e.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F184411%2Fec0489ba-df69-481e-8d2a-f837a2a9b65e.png'}
|
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png'}
| null | 570,884
|
||
article
| 1,080,723
|
Understanding the Shared Responsibility Model in AWS
|
In this post, I will be talking about Understanding the Shared Responsibility Model in AWS. This is...
|
May 10 '22
|
understanding-the-shared-responsibility-model-in-aws-5ej7
|
/aws-builders/understanding-the-shared-responsibility-model-in-aws-5ej7
|
https://dev.to/aws-builders/understanding-the-shared-responsibility-model-in-aws-5ej7
| 0
| 8
| null |
2022-05-10T14:53:07Z
| null | null | 8
|
https://dev.to/aws-builders/understanding-the-shared-responsibility-model-in-aws-5ej7
|
2022-05-10T07:25:03Z
|
2022-05-10T17:40:57Z
| null |
2022-05-10T14:53:07Z
|
2022-05-10T14:53:07Z
| 4
|
['security', 'aws', 'responsibility', 'compliance']
|
security, aws, responsibility, compliance
|
{'name': 'Imoh Etuk', 'username': 'imohweb', 'twitter_username': 'iamrealimoh', 'github_username': 'imohweb', 'user_id': 200347, 'website_url': 'https://techdirectarchive.com/author/iamrealimoh1/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F200347%2F2b1d06e3-ba3f-4328-9134-f1435f72a1e0.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F200347%2F2b1d06e3-ba3f-4328-9134-f1435f72a1e0.jpeg'}
|
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png'}
| null | 570,885
|
||
article
| 1,076,336
|
CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape
|
A brief description of CNAPP (Cloud-native application protection platform) – the convergence of CWPP, CSPM, and CIEM. Not a very helpful definition if you don't know CWPP, CSPM, and CIEM, right? Let’s try to find out more step by step.
|
May 5 '22
|
cspm-ciem-cwpp-and-cnapp-guess-who-in-cloud-security-landscape-2ohb
|
/sysdig/cspm-ciem-cwpp-and-cnapp-guess-who-in-cloud-security-landscape-2ohb
|
https://dev.to/sysdig/cspm-ciem-cwpp-and-cnapp-guess-who-in-cloud-security-landscape-2ohb
| 0
| 13
| null |
2022-05-05T13:35:17Z
| null | null | 13
|
https://sysdig.com/blog/cnapp-cloud-security-sysdig/
|
2022-05-05T13:35:03Z
|
2022-09-21T07:53:48Z
| null |
2022-05-05T13:35:17Z
|
2022-05-05T13:35:17Z
| 5
|
['gartner', 'cnapp', 'compliance', 'devops']
|
gartner, cnapp, compliance, devops
|
{'name': 'Miguel', 'username': 'miguel000', 'twitter_username': None, 'github_username': 'Miguel000', 'user_id': 134400, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F134400%2Fef81aa81-1367-4f26-bacb-762eb16c85bd.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F134400%2Fef81aa81-1367-4f26-bacb-762eb16c85bd.jpeg'}
|
{'name': 'Sysdig', 'username': 'sysdig', 'slug': 'sysdig', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6084%2Fd2633afb-5834-4976-913e-e4df77f6cd5c.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6084%2Fd2633afb-5834-4976-913e-e4df77f6cd5c.png'}
| null | 570,886
|
||
article
| 1,059,668
|
Managing compliance the Serverless way with AWS Config custom rules
|
AWS Config is a tool for continuous monitoring and conducting compliance checks across your resources...
|
Apr 18 '22
|
managing-compliance-the-serverless-way-with-aws-config-custom-rules-fg
|
/mohdizzy/managing-compliance-the-serverless-way-with-aws-config-custom-rules-fg
|
https://dev.to/mohdizzy/managing-compliance-the-serverless-way-with-aws-config-custom-rules-fg
| 0
| 6
| null |
2022-04-18T17:19:52Z
| null | null | 6
|
https://mohdizzy.medium.com/managing-compliance-the-serverless-way-with-aws-config-custom-rules-4a0294ac0b52
|
2022-04-18T13:48:03Z
| null | null |
2022-04-18T17:19:52Z
|
2022-04-18T17:19:52Z
| 5
|
['serverless', 'compliance', 'awsconfig', 'lambd']
|
serverless, compliance, awsconfig, lambd
|
{'name': 'Mohammed', 'username': 'mohdizzy', 'twitter_username': 'mohd_izzy', 'github_username': 'mohdizzy', 'user_id': 350035, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F350035%2F18d11ea5-11a2-4de3-808d-e6d92f12dad7.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F350035%2F18d11ea5-11a2-4de3-808d-e6d92f12dad7.jpg'}
| null | null | 570,887
|
||
article
| 1,055,887
|
About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes
|
The project steampipe uses a fast programing language and an intelligent caching approach outrunning...
|
Apr 14 '22
|
about-optimizing-for-speed-how-to-do-complete-aws-securitycompliance-scans-in-5-minutes-46ld
|
/aws-builders/about-optimizing-for-speed-how-to-do-complete-aws-securitycompliance-scans-in-5-minutes-46ld
|
https://dev.to/aws-builders/about-optimizing-for-speed-how-to-do-complete-aws-securitycompliance-scans-in-5-minutes-46ld
| 0
| 14
| null |
2022-04-14T15:52:16Z
| null | null | 14
|
https://aws-blog.de/2022/04/about-optimizing-for-speed-how-to-do-complete-aws-securitycompliance-scans-in-5-minutes.html
|
2022-04-14T14:06:53Z
| null | null |
2022-04-14T15:52:16Z
|
2022-04-14T15:52:16Z
| 9
|
['aws', 'security', 'compliance', 'go']
|
aws, security, compliance, go
|
{'name': 'Gernot Glawe', 'username': 'megaproaktiv', 'twitter_username': 'megaproaktiv', 'github_username': 'megaproaktiv', 'user_id': 184411, 'website_url': 'https://www.go-on-aws.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F184411%2Fec0489ba-df69-481e-8d2a-f837a2a9b65e.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F184411%2Fec0489ba-df69-481e-8d2a-f837a2a9b65e.png'}
|
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png'}
| null | 570,888
|
||
article
| 1,045,711
|
Managing Compliance with Continuous Delivery
|
This article explores how continuous delivery helps organizations maintain compliance and discusses...
|
Apr 5 '22
|
managing-compliance-with-continuous-delivery-4lk1
|
/armory/managing-compliance-with-continuous-delivery-4lk1
|
https://dev.to/armory/managing-compliance-with-continuous-delivery-4lk1
| 0
| 2
| null |
2022-04-05T23:11:33Z
| null | null | 2
| null |
https://www.armory.io/blog/managing-compliance-with-continuous-delivery/
|
2022-04-05T18:20:47Z
| null |
2022-04-05T23:11:33Z
|
2022-04-05T15:52:49Z
|
2022-04-05T15:52:49Z
| 6
|
['compliance', 'continuousdelivery', 'devops']
|
compliance, continuousdelivery, devops
|
{'name': 'danielGz', 'username': 'danielgz', 'twitter_username': None, 'github_username': 'danielGz', 'user_id': 776288, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F776288%2F940994ef-5aef-4644-ab5d-7481663818d3.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F776288%2F940994ef-5aef-4644-ab5d-7481663818d3.jpeg'}
|
{'name': 'Armory', 'username': 'armory', 'slug': 'armory', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3720%2Fa3f0169f-e8ab-42de-9496-514554e1f079.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3720%2Fa3f0169f-e8ab-42de-9496-514554e1f079.jpg'}
| null | 570,889
|
|
article
| 1,043,779
|
How Courier Became SOC 2 Type 2 Compliant
|
The consumerization of SaaS has resulted in a massive handling of PII (personally identifiable...
|
Apr 4 '22
|
how-courier-became-soc-2-type-2-compliant-2ohi
|
/courier/how-courier-became-soc-2-type-2-compliant-2ohi
|
https://dev.to/courier/how-courier-became-soc-2-type-2-compliant-2ohi
| 0
| 5
| null |
2022-04-04T04:44:40Z
| null | null | 5
|
https://www.courier.com/blog/how-courier-became-soc-2-type-2-compliant/
|
2022-04-04T04:44:40Z
|
2022-09-28T16:29:29Z
| null |
2022-04-04T04:44:40Z
|
2022-04-04T04:44:40Z
| 5
|
['compliance', 'soc2type2', 'security', 'cybersecurity']
|
compliance, soc2type2, security, cybersecurity
|
{'name': 'Aman', 'username': 'aman_kandola', 'twitter_username': None, 'github_username': 'Rarlegend', 'user_id': 514094, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F514094%2Ffa963339-9081-4a16-866a-672ffe43319a.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F514094%2Ffa963339-9081-4a16-866a-672ffe43319a.png'}
|
{'name': 'Courier', 'username': 'courier', 'slug': 'courier', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3288%2Fd7c19ec0-5176-496e-b68e-d0e11b23b5aa.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3288%2Fd7c19ec0-5176-496e-b68e-d0e11b23b5aa.png'}
| null | 570,890
|
||
article
| 1,036,523
|
Using ARMO Kubescape to scale kubernetes security adoption across an enterprise
|
Note - This is not an introduction to Kubernetes. It is expected that the reader is already aware of...
|
Mar 28 '22
|
using-armo-kubescape-to-scale-kubernetes-security-adoption-across-an-enterprise-5gio
|
/turjachaudhuri/using-armo-kubescape-to-scale-kubernetes-security-adoption-across-an-enterprise-5gio
|
https://dev.to/turjachaudhuri/using-armo-kubescape-to-scale-kubernetes-security-adoption-across-an-enterprise-5gio
| 0
| 10
| null |
2022-03-28T11:01:33Z
| null | null | 10
| null |
https://dev.to/turjachaudhuri/using-armo-kubescape-to-scale-kubernetes-security-adoption-across-an-enterprise-5gio
|
2022-03-28T04:42:12Z
|
2022-03-28T13:00:45Z
| null |
2022-03-28T11:01:33Z
|
2022-03-28T11:01:33Z
| 14
|
['kubernetes', 'security', 'kubescape', 'compliance']
|
kubernetes, security, kubescape, compliance
|
{'name': 'Turja Narayan Chaudhuri', 'username': 'turjachaudhuri', 'twitter_username': None, 'github_username': 'turjachaudhuri', 'user_id': 466007, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F466007%2F8ed46db0-4168-4218-b9d7-3b6b21d474ce.PNG', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F466007%2F8ed46db0-4168-4218-b9d7-3b6b21d474ce.PNG'}
| null | null | 570,891
|
|
article
| 1,019,893
|
The Essential PCI Compliance Checklist
|
"There's no way I'm buying online. Did you hear about that credit card leak?" It's ironic that, at...
|
Mar 11 '22
|
the-essential-pci-compliance-checklist-41dk
|
/yayabobi/the-essential-pci-compliance-checklist-41dk
|
https://dev.to/yayabobi/the-essential-pci-compliance-checklist-41dk
| 1
| 3
| null |
2022-03-11T17:42:20Z
| null | null | 3
| null |
https://dev.to/yayabobi/the-essential-pci-compliance-checklist-41dk
|
2022-03-11T17:42:20Z
| null | null |
2022-03-11T17:42:20Z
|
2023-03-01T15:03:50Z
| 7
|
['cybersecurity', 'devops', 'security', 'compliance']
|
cybersecurity, devops, security, compliance
|
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F665355%2Ff291ba1e-cc58-43fa-965e-4380aa2e16cb.png'}
| null | null | 570,892
|
|
article
| 944,751
|
Open sourcing Licensebat
|
Learn why I decided to open source Licensebat, the software that easily helps you manage the licenses...
|
Jan 4 '22
|
open-sourcing-licensebat-4ff7
|
/robertohuertasm/open-sourcing-licensebat-4ff7
|
https://dev.to/robertohuertasm/open-sourcing-licensebat-4ff7
| 0
| 0
| null |
2022-01-04T22:02:47Z
| null | null | 0
|
https://robertohuertas.com/2022/01/04/licensebat-open-source/
|
2022-01-04T21:57:15Z
|
2022-01-04T23:02:36Z
|
2022-01-04T22:02:47Z
|
2022-01-03T23:00:00Z
|
2022-01-03T23:00:00Z
| 3
|
['rust', 'opensource', 'license', 'compliance']
|
rust, opensource, license, compliance
|
{'name': 'Roberto Huertas', 'username': 'robertohuertasm', 'twitter_username': 'robertohuertasm', 'github_username': 'robertohuertasm', 'user_id': 152108, 'website_url': 'https://robertohuertas.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F152108%2F440b5907-4824-4427-9cde-a80f62067381.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F152108%2F440b5907-4824-4427-9cde-a80f62067381.jpg'}
| null | null | 570,893
|
||
article
| 920,128
|
Reducing Risk by Automating Security with Continuous Delivery
|
Risk avoidance has become a cardinal principle of modern enterprises. Companies like Armory have...
|
Dec 10 '21
|
reducing-risk-by-automating-security-with-continuous-delivery-2nm3
|
/armory/reducing-risk-by-automating-security-with-continuous-delivery-2nm3
|
https://dev.to/armory/reducing-risk-by-automating-security-with-continuous-delivery-2nm3
| 0
| 2
| null |
2021-12-10T00:34:28Z
| null | null | 2
| null |
https://www.armory.io/blog/reducing-risk-by-automating-security-with-continuous-delivery/
|
2021-12-07T18:39:09Z
| null |
2021-12-10T00:34:28Z
|
2021-12-09T16:30:37Z
|
2021-12-09T16:30:37Z
| 6
|
['compliance', 'security', 'devops']
|
compliance, security, devops
|
{'name': 'stephenatwell', 'username': 'stephenatwell', 'twitter_username': None, 'github_username': 'stephenatwell', 'user_id': 645503, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F645503%2Fb11cdbac-3144-41f2-b364-66aeddb265a1.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F645503%2Fb11cdbac-3144-41f2-b364-66aeddb265a1.png'}
|
{'name': 'Armory', 'username': 'armory', 'slug': 'armory', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3720%2Fa3f0169f-e8ab-42de-9496-514554e1f079.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3720%2Fa3f0169f-e8ab-42de-9496-514554e1f079.jpg'}
| null | 570,894
|
|
article
| 916,655
|
U.S Sales Tax: The Nightmare of Scaling a SaaS Business
|
So your eCommerce business is experiencing rapid growth. You’re scaling your operations and...
|
Dec 3 '21
|
us-sales-tax-the-nightmare-of-scaling-a-saas-business-3ki
|
/paypro_global/us-sales-tax-the-nightmare-of-scaling-a-saas-business-3ki
|
https://dev.to/paypro_global/us-sales-tax-the-nightmare-of-scaling-a-saas-business-3ki
| 0
| 1
| null |
2021-12-03T16:56:24Z
| null | null | 1
|
https://dev.to/paypro_global/us-sales-tax-the-nightmare-of-scaling-a-saas-business-3ki
|
2021-12-03T16:56:24Z
| null | null |
2021-12-03T16:56:24Z
|
2021-12-03T16:56:24Z
| 5
|
['saas', 'tax', 'compliance']
|
saas, tax, compliance
|
{'name': 'PayPro Global', 'username': 'paypro_global', 'twitter_username': 'paypro_global', 'github_username': None, 'user_id': 748876, 'website_url': 'https://blog.payproglobal.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F748876%2F6fc92b7f-4a7b-4fe8-9f47-2ed2fa5d81d1.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F748876%2F6fc92b7f-4a7b-4fe8-9f47-2ed2fa5d81d1.jpg'}
| null | null | 570,895
|
||
article
| 864,256
|
Level up compliance confidence with AWS Config
|
With the ever increasing adoption of moving workloads to public cloud providers like AWS, satisfying...
|
Oct 15 '21
|
level-up-compliance-confidence-with-aws-config-15ne
|
/aws-builders/level-up-compliance-confidence-with-aws-config-15ne
|
https://dev.to/aws-builders/level-up-compliance-confidence-with-aws-config-15ne
| 0
| 5
| null |
2021-10-15T11:23:31Z
|
en
| null | 5
| null |
https://dev.to/aws-builders/level-up-compliance-confidence-with-aws-config-15ne
|
2021-10-15T05:00:13Z
| null | null |
2021-10-15T11:23:31Z
|
2021-10-15T11:23:31Z
| 3
|
['aws', 'security', 'devops', 'compliance']
|
aws, security, devops, compliance
|
{'name': 'Michael Wu', 'username': 'wujianfei', 'twitter_username': 'wujianfei', 'github_username': None, 'user_id': 500609, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F500609%2F6b25b8e1-a3f3-4f55-8a7c-79a5defda8d3.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F500609%2F6b25b8e1-a3f3-4f55-8a7c-79a5defda8d3.jpg'}
|
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png'}
| null | 570,896
|
|
article
| 882,222
|
Raising funds for your web app? Get ready for a tough tech audit!
|
I just came out of an investors' due diligence audit on the SaaS platform we are building for a...
|
Nov 4 '21
|
raising-funds-for-your-web-app-get-ready-for-a-tough-tech-audit-32gc
|
/sylvainreiter/raising-funds-for-your-web-app-get-ready-for-a-tough-tech-audit-32gc
|
https://dev.to/sylvainreiter/raising-funds-for-your-web-app-get-ready-for-a-tough-tech-audit-32gc
| 0
| 0
| null |
2021-11-04T10:05:27Z
|
en
| null | 0
| null |
https://theuxcto.com/digital-blitz/raising-funds-for-your-web-app-get-ready-for-a-tough-tech-audit/
|
2021-10-30T17:24:53Z
| null |
2021-11-04T10:05:27Z
|
2021-10-30T16:04:45Z
|
2021-10-30T16:04:45Z
| 5
|
['technology', 'audit', 'compliance', 'devops']
|
technology, audit, compliance, devops
|
{'name': 'Sylvain Reiter / The UX CTO', 'username': 'sylvainreiter', 'twitter_username': 'sylvainreiter', 'github_username': None, 'user_id': 552484, 'website_url': 'https://theuxcto.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F552484%2Fda67cc83-1c63-4d58-abe8-2120dc576df9.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F552484%2Fda67cc83-1c63-4d58-abe8-2120dc576df9.jpg'}
| null | null | 570,897
|
|
article
| 853,484
|
Send AWS Config Notification to Slack
|
What is AWS Config? AWS Config provides a detailed view of the configuration of AWS...
|
Oct 6 '21
|
send-aws-config-notification-to-slack-1f7j
|
/aws-builders/send-aws-config-notification-to-slack-1f7j
|
https://dev.to/aws-builders/send-aws-config-notification-to-slack-1f7j
| 0
| 8
| null |
2021-10-06T11:20:05Z
|
en
| null | 8
|
https://dev.to/aws-builders/send-aws-config-notification-to-slack-1f7j
|
2021-10-06T11:12:30Z
|
2021-10-07T07:04:36Z
| null |
2021-10-06T11:20:05Z
|
2021-10-06T11:20:05Z
| 2
|
['aws', 'monitoring', 'compliance', 'auditing']
|
aws, monitoring, compliance, auditing
|
{'name': 'Emre Oztoprak', 'username': 'emreoztoprak', 'twitter_username': None, 'github_username': 'emreoztoprak', 'user_id': 720292, 'website_url': 'https://emre.oztoprak.co', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F720292%2F36a61117-69a9-4353-abad-081ddb1ea230.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F720292%2F36a61117-69a9-4353-abad-081ddb1ea230.jpeg'}
|
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae2dfca8be94.png'}
| null | 570,898
|
||
article
| 755,587
|
Moderating Actions on Stream's Activity Feeds service
|
(headline image by Claudio Schwarz) This is for Stream, or getstream.io's Activity...
|
Jul 11 '21
|
moderating-actions-on-getstream-io-s-activity-feed-1m4
|
/scampiuk/moderating-actions-on-getstream-io-s-activity-feed-1m4
|
https://dev.to/scampiuk/moderating-actions-on-getstream-io-s-activity-feed-1m4
| 0
| 0
| null |
2021-07-11T07:04:26Z
|
en
| null | 0
|
https://dev.to/scampiuk/moderating-actions-on-getstream-io-s-activity-feed-1m4
|
2021-07-10T13:43:47Z
|
2021-07-11T07:23:32Z
| null |
2021-07-11T07:04:26Z
|
2021-07-11T07:04:26Z
| 4
|
['getstreamio', 'aws', 'lambda', 'compliance']
|
getstreamio, aws, lambda, compliance
|
{'name': 'Chris Williams', 'username': 'scampiuk', 'twitter_username': 'Scampiuk', 'github_username': 'scampiuk', 'user_id': 18802, 'website_url': 'https://dev.to/scampiuk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F18802%2F110973a9-1bef-47c0-8e70-44667334b803.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F18802%2F110973a9-1bef-47c0-8e70-44667334b803.jpg'}
| null | null | 570,899
|
||
article
| 728,918
|
☑️ SOC 2 Compliance and Certification: What SaaS Businesses Need to Know
|
📓 SOC 2 is a technical security audit report from the AICPA that evaluates a tech service...
|
Jun 15 '21
|
soc-2-compliance-and-certification-what-saas-businesses-need-to-know-1cf2
|
/robertinoc_dev/soc-2-compliance-and-certification-what-saas-businesses-need-to-know-1cf2
|
https://dev.to/robertinoc_dev/soc-2-compliance-and-certification-what-saas-businesses-need-to-know-1cf2
| 0
| 1
| null |
2021-06-15T12:00:01Z
|
en
| null | 1
| null |
https://dev.to/robertinoc_dev/soc-2-compliance-and-certification-what-saas-businesses-need-to-know-1cf2
|
2021-06-15T12:00:01Z
| null | null |
2021-06-15T12:00:01Z
|
2021-06-15T12:00:01Z
| 2
|
['security', 'compliance', 'saas']
|
security, compliance, saas
|
{'name': 'Robertino', 'username': 'robertinoc_dev', 'twitter_username': 'robertinocok', 'github_username': 'robertinoc', 'user_id': 426331, 'website_url': 'https://www.linkedin.com/in/robertinocalcaterra/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png'}
| null | null | 570,900
|
|
article
| 727,843
|
☑️ HIPAA/HITECH: A Compliance Guide For Businesses
|
📓 HIPAA and HITECH both provide legal guidelines for managing protected health information...
|
Jun 14 '21
|
hipaa-hitech-a-compliance-guide-for-businesses-3c1m
|
/robertinoc_dev/hipaa-hitech-a-compliance-guide-for-businesses-3c1m
|
https://dev.to/robertinoc_dev/hipaa-hitech-a-compliance-guide-for-businesses-3c1m
| 0
| 1
| null |
2021-06-14T11:39:40Z
|
en
| null | 1
| null |
https://dev.to/robertinoc_dev/hipaa-hitech-a-compliance-guide-for-businesses-3c1m
|
2021-06-14T11:39:40Z
| null | null |
2021-06-14T11:39:40Z
|
2021-06-14T11:39:40Z
| 2
|
['compliance', 'security']
|
compliance, security
|
{'name': 'Robertino', 'username': 'robertinoc_dev', 'twitter_username': 'robertinocok', 'github_username': 'robertinoc', 'user_id': 426331, 'website_url': 'https://www.linkedin.com/in/robertinocalcaterra/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png'}
| null | null | 570,901
|
|
article
| 663,288
|
GraphQL and Government Technology
|
Not surprisingly, the question of GraphQL in government -- or highly regulated -- spaces is a topic...
|
Apr 12 '21
|
graphql-and-government-technology-305d
|
/hasurahq/graphql-and-government-technology-305d
|
https://dev.to/hasurahq/graphql-and-government-technology-305d
| 0
| 1
| null |
2021-04-12T17:36:44Z
|
en
| null | 1
| null |
https://hasura.io/blog/graphql-and-government-technology/
|
2021-04-12T17:21:04Z
|
2021-04-12T17:37:22Z
|
2021-04-12T17:36:44Z
|
2021-04-12T14:18:01Z
|
2021-04-12T14:18:01Z
| 4
|
['graphqlsecurity', 'graphqlasia', 'compliance']
|
graphqlsecurity, graphqlasia, compliance
|
{'name': 'Hasura', 'username': 'hasurahq_staff', 'twitter_username': 'HasuraHQ', 'github_username': None, 'user_id': 148148, 'website_url': 'https://hasura.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F148148%2Fe46f8c9d-4810-49e5-b085-900bc07527e0.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F148148%2Fe46f8c9d-4810-49e5-b085-900bc07527e0.png'}
|
{'name': 'Hasura', 'username': 'hasurahq', 'slug': 'hasurahq', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F397%2F0f80fcfc-b6d9-4725-b97a-58fc08bbe0e6.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F397%2F0f80fcfc-b6d9-4725-b97a-58fc08bbe0e6.png'}
| null | 570,902
|
|
article
| 659,182
|
How to get SOC 2 Certified
|
SOC 2 is an audit conducted by third-party certified auditors who check an organization on five trust principles and is considered the Gold Standard for security compliance.
|
Apr 8 '21
|
how-to-get-soc-2-certified-38d2
|
/rudderstack/how-to-get-soc-2-certified-38d2
|
https://dev.to/rudderstack/how-to-get-soc-2-certified-38d2
| 0
| 4
| null |
2021-04-08T15:49:33Z
|
en
| null | 4
|
https://dev.to/rudderstack/how-to-get-soc-2-certified-38d2
|
2021-04-08T15:48:55Z
| null | null |
2021-04-08T15:49:33Z
|
2021-04-08T15:49:33Z
| 2
|
['security', 'compliance', 'soc2', 'rudderstack']
|
security, compliance, soc2, rudderstack
|
{'name': 'Nočnica Mellifera', 'username': 'nocnica', 'twitter_username': 'ServerlessMom', 'github_username': 'serverless-mom', 'user_id': 162459, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F162459%2F8d0dc115-8aac-4a0f-8bc0-7e7c597aef12.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F162459%2F8d0dc115-8aac-4a0f-8bc0-7e7c597aef12.jpg'}
|
{'name': 'RudderStack', 'username': 'rudderstack', 'slug': 'rudderstack', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3266%2F5a64891d-b811-4423-9216-efdbbdfcabf1.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3266%2F5a64891d-b811-4423-9216-efdbbdfcabf1.png'}
| null | 570,903
|
||
article
| 651,030
|
Automating Management of Google Compute Engine VM fleets at scale
|
If you have hundreds of virtual machines deployed in your environment, you already know how difficult...
|
Apr 4 '21
|
managing-compute-engine-fleet-at-scale-4n9i
|
/stack-labs/managing-compute-engine-fleet-at-scale-4n9i
|
https://dev.to/stack-labs/managing-compute-engine-fleet-at-scale-4n9i
| 1
| 12
| null |
2021-04-04T16:37:23Z
|
en
| null | 12
|
https://dev.to/stack-labs/managing-compute-engine-fleet-at-scale-4n9i
|
2021-03-31T12:30:22Z
|
2021-06-15T17:48:01Z
| null |
2021-04-04T16:37:23Z
|
2021-12-10T10:37:46Z
| 15
|
['googlecloud', 'security', 'compliance', 'terraform']
|
googlecloud, security, compliance, terraform
|
{'name': 'Chabane R.', 'username': 'chabane', 'twitter_username': 'ChabaneRefes', 'github_username': 'Chabane', 'user_id': 383123, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F383123%2F7cc2e0f2-9f96-49eb-8079-98212a89428d.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F383123%2F7cc2e0f2-9f96-49eb-8079-98212a89428d.jpg'}
|
{'name': 'Stack Labs', 'username': 'stack-labs', 'slug': 'stack-labs', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F1533%2F4d4f0f48-1dee-4525-9969-a7ba13bcb3ce.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F1533%2F4d4f0f48-1dee-4525-9969-a7ba13bcb3ce.png'}
| null | 570,904
|
||
article
| 563,446
|
📊CPRA Passed. What’s Changing in “CCPA 2.0”
|
🇺🇸 The new California law goes much further than its predecessor. Read more...
|
Jan 6 '21
|
cpra-passed-what-s-changing-in-ccpa-2-0-358p
|
/robertinoc_dev/cpra-passed-what-s-changing-in-ccpa-2-0-358p
|
https://dev.to/robertinoc_dev/cpra-passed-what-s-changing-in-ccpa-2-0-358p
| 0
| 0
| null |
2021-01-06T16:21:01Z
|
en
| null | 0
| null |
https://dev.to/robertinoc_dev/cpra-passed-what-s-changing-in-ccpa-2-0-358p
|
2021-01-06T16:21:01Z
| null | null |
2021-01-06T16:21:01Z
|
2021-01-06T16:21:01Z
| 1
|
['compliance', 'ccpa', 'cpra']
|
compliance, ccpa, cpra
|
{'name': 'Robertino', 'username': 'robertinoc_dev', 'twitter_username': 'robertinocok', 'github_username': 'robertinoc', 'user_id': 426331, 'website_url': 'https://www.linkedin.com/in/robertinocalcaterra/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png'}
| null | null | 570,905
|
|
article
| 561,102
|
📊 What Is PCI? A Business Guide to Compliance ✔️
|
💳 Every business that accepts credit cards needs to be compliant with PCI, but your obligations vary...
|
Jan 4 '21
|
what-is-pci-a-business-guide-to-compliance-2iob
|
/robertinoc_dev/what-is-pci-a-business-guide-to-compliance-2iob
|
https://dev.to/robertinoc_dev/what-is-pci-a-business-guide-to-compliance-2iob
| 1
| 0
| null |
2021-01-04T16:42:06Z
|
en
| null | 0
| null |
https://dev.to/robertinoc_dev/what-is-pci-a-business-guide-to-compliance-2iob
|
2021-01-04T16:42:06Z
| null | null |
2021-01-04T16:42:06Z
|
2023-01-30T15:30:02Z
| 1
|
['security', 'compliance', 'pci']
|
security, compliance, pci
|
{'name': 'Robertino', 'username': 'robertinoc_dev', 'twitter_username': 'robertinocok', 'github_username': 'robertinoc', 'user_id': 426331, 'website_url': 'https://www.linkedin.com/in/robertinocalcaterra/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png'}
| null | null | 570,906
|
|
article
| 556,908
|
6 controles básicos de segurança do CIS para adotar na sua vida
|
Apesar de estarmos bem avançados no tempo, a segurança da informação ainda é muito negligenciada pela...
|
Dec 31 '20
|
6-controles-basicos-de-seguranca-do-cis-para-adotar-na-sua-vida-30h8
|
/leh_mariaa/6-controles-basicos-de-seguranca-do-cis-para-adotar-na-sua-vida-30h8
|
https://dev.to/leh_mariaa/6-controles-basicos-de-seguranca-do-cis-para-adotar-na-sua-vida-30h8
| 0
| 1
| null |
2020-12-31T01:12:39Z
|
pt
| null | 1
| null |
https://dev.to/leh_mariaa/6-controles-basicos-de-seguranca-do-cis-para-adotar-na-sua-vida-30h8
|
2020-12-31T01:12:39Z
| null | null |
2020-12-31T01:12:39Z
|
2020-12-31T01:12:39Z
| 4
|
['cybersecurity', 'compliance']
|
cybersecurity, compliance
|
{'name': 'Leh 🚘', 'username': 'leh_mariaa', 'twitter_username': '_lehmariaa', 'github_username': 'lehmaria', 'user_id': 224116, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F224116%2F06e49132-2f8e-489e-a6db-de12b37f21a9.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F224116%2F06e49132-2f8e-489e-a6db-de12b37f21a9.jpeg'}
| null | null | 570,907
|
|
article
| 555,593
|
🌍Auth0 Customers: Your Brexit Questions Answered
|
📈Making sense of regulatory uncertainty in Brexit impact planning Read more...
|
Dec 29 '20
|
auth0-customers-your-brexit-questions-answered-7k9
|
/robertinoc_dev/auth0-customers-your-brexit-questions-answered-7k9
|
https://dev.to/robertinoc_dev/auth0-customers-your-brexit-questions-answered-7k9
| 1
| 0
| null |
2020-12-29T14:54:48Z
|
en
| null | 0
| null |
https://dev.to/robertinoc_dev/auth0-customers-your-brexit-questions-answered-7k9
|
2020-12-29T14:54:48Z
| null | null |
2020-12-29T14:54:48Z
|
2021-06-25T13:27:50Z
| 1
|
['brexit', 'compliance', 'laws']
|
brexit, compliance, laws
|
{'name': 'Robertino', 'username': 'robertinoc_dev', 'twitter_username': 'robertinocok', 'github_username': 'robertinoc', 'user_id': 426331, 'website_url': 'https://www.linkedin.com/in/robertinocalcaterra/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F426331%2Fa2be3362-f2b1-451a-a866-62bfece02f4d.png'}
| null | null | 570,908
|
|
article
| 507,391
|
Governance with AWS Config
|
AWS Config allows you to assess configuration based on predefined rules or custom rules based on lamb...
|
Dec 16 '20
|
governance-with-aws-config-2jg8
|
/danquack/governance-with-aws-config-2jg8
|
https://dev.to/danquack/governance-with-aws-config-2jg8
| 0
| 3
| null |
2020-12-16T19:14:14Z
|
en
| null | 3
| null |
https://dev.to/danquack/governance-with-aws-config-2jg8
|
2020-11-05T17:20:29Z
|
2024-01-22T04:15:56Z
| null |
2020-12-16T19:14:14Z
|
2020-12-16T19:14:14Z
| 2
|
['aws', 'compliance', 'config', 'security']
|
aws, compliance, config, security
|
{'name': 'Daniel Quackenbush', 'username': 'danquack', 'twitter_username': 'Dan_quack', 'github_username': 'danquack', 'user_id': 90645, 'website_url': 'https://danquack.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F90645%2F550aa48e-3ee3-430a-8d30-32e6aa0b746b.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F90645%2F550aa48e-3ee3-430a-8d30-32e6aa0b746b.jpeg'}
| null | null | 570,909
|
|
article
| 14,911
|
Configuring Chef Automate to Trigger PagerDuty Alerts
|
Wouldn’t it be great if we could generate an incident when our systems fell out of compliance? By combining Chef Automate and PagerDuty, through simple webhooks, we can absolutely do this.
|
Dec 21 '17
|
configuring-chef-automate-to-trigger-pagerduty-alerts-556l
|
/mattstratton/configuring-chef-automate-to-trigger-pagerduty-alerts-556l
|
https://dev.to/mattstratton/configuring-chef-automate-to-trigger-pagerduty-alerts-556l
| 0
| 13
| null |
2017-12-21T21:17:24Z
| null | null | 13
|
https://medium.com/@mattstratton/configuring-chef-automate-to-trigger-pagerduty-alerts-823a1fab9402
|
2017-12-21T21:07:16Z
|
2018-03-17T11:37:04Z
|
2017-12-21T21:17:24Z
|
2017-12-21T20:58:56Z
|
2018-03-13T20:12:07Z
| 4
|
['devops', 'compliance', 'pagerduty', 'chef']
|
devops, compliance, pagerduty, chef
|
{'name': 'Matty Stratton', 'username': 'mattstratton', 'twitter_username': 'mattstratton', 'github_username': 'mattstratton', 'user_id': 38834, 'website_url': 'https://www.mattstratton.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F38834%2F68a98062-d7f1-4797-8a79-a34d8d217a27.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F38834%2F68a98062-d7f1-4797-8a79-a34d8d217a27.jpg'}
| null | null | 570,910
|
||
article
| 217,750
|
Hiring employees in foreign country benchmark
|
Hiring the best talent often goes beyond the inhouse borders and, sad to say, beyond the legal contex...
|
Dec 9 '19
|
global-talent-incorporation-42di
|
/anton_p/global-talent-incorporation-42di
|
https://dev.to/anton_p/global-talent-incorporation-42di
| 0
| 6
| null |
2019-12-09T15:52:03Z
| null | null | 6
|
https://dev.to/anton_p/global-talent-incorporation-42di
|
2019-12-09T15:50:05Z
|
2019-12-23T16:40:54Z
| null |
2019-12-09T15:52:03Z
|
2019-12-09T15:52:03Z
| 1
|
['talent', 'expansion', 'compliance']
|
talent, expansion, compliance
|
{'name': 'Anton ', 'username': 'anton_p', 'twitter_username': 'antonPanasyuk', 'github_username': None, 'user_id': 288691, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F288691%2F9cd5673d-cc6d-4acf-84f2-a7530ce8e3c0.jpg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F288691%2F9cd5673d-cc6d-4acf-84f2-a7530ce8e3c0.jpg'}
| null | null | 570,911
|
||
article
| 2,010,200
|
10 Software Design and Programming Best Practices for Developers
|
These are collections of coding best practices, programming best practices, and software design best practices for developers.
|
Sep 22 '24
|
10-software-design-and-programming-best-practices-for-developers-ecn
|
/somadevtoo/10-software-design-and-programming-best-practices-for-developers-ecn
|
https://dev.to/somadevtoo/10-software-design-and-programming-best-practices-for-developers-ecn
| 13
| 388
| null |
2024-09-22T14:19:36Z
|
en
| null | 388
| null |
https://dev.to/somadevtoo/10-software-design-and-programming-best-practices-for-developers-ecn
|
2024-09-22T14:19:36Z
|
2024-09-22T14:21:23Z
| null |
2024-09-22T14:19:36Z
|
2024-12-23T02:17:29Z
| 11
|
['programming', 'coding', 'softwaredevelopment', 'softwaredesign']
|
programming, coding, softwaredevelopment, softwaredesign
|
{'name': 'Soma', 'username': 'somadevtoo', 'twitter_username': 'SweetSysters', 'github_username': None, 'user_id': 143755, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F143755%2F8cbedfa8-996d-401d-984c-38357059cd0a.png', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F143755%2F8cbedfa8-996d-401d-984c-38357059cd0a.png'}
| null | null | 570,912
|
|
article
| 1,984,584
|
Book: A Philosophy of Software Design
|
This book offers insights and wisdom from a seasoned software engineer, with detailed breakdowns of...
|
Sep 29 '24
|
book-a-philosophy-of-software-design-2je1
|
/airtucha/book-a-philosophy-of-software-design-2je1
|
https://dev.to/airtucha/book-a-philosophy-of-software-design-2je1
| 0
| 1
| 3,934
|
2024-09-29T05:59:09Z
|
en
| null | 1
| null |
https://dev.to/airtucha/book-a-philosophy-of-software-design-2je1
|
2024-09-02T20:12:43Z
| null | null |
2024-09-29T05:59:09Z
|
2024-09-29T05:59:09Z
| 1
|
['softwaredevelopment', 'softwaredesign', 'softwareengineering']
|
softwaredevelopment, softwaredesign, softwareengineering
|
{'name': 'Alexey Tukalo', 'username': 'airtucha', 'twitter_username': None, 'github_username': 'AIRTucha', 'user_id': 273840, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F273840%2F2f05f5aa-6e6e-494c-8516-1f7063eca6f3.jpeg', 'profile_image_90': 'https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F273840%2F2f05f5aa-6e6e-494c-8516-1f7063eca6f3.jpeg'}
| null | null | 570,913
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.