Scan Sensitive Data Using the Nightfall API in 40 Lines of Code
#dlp #dataloss #dataleakprevention #dataleakprotection #softwaredevelopment #webdevelopment #flask #filescanner
https://hackernoon.com/scan-sensitive-data-using-the-nightfall-api-in-40-lines-of-code
#dlp #dataloss #dataleakprevention #dataleakprotection #softwaredevelopment #webdevelopment #flask #filescanner
https://hackernoon.com/scan-sensitive-data-using-the-nightfall-api-in-40-lines-of-code
Hackernoon
Scan Sensitive Data Using the Nightfall API in 40 Lines of Code | Hacker Noon
Create and deploy a server that scans files for sensitive data (like credit card numbers) with Nightfall's data loss prevention APIs.
Exploring Substitutes for Confidential Watermarks on Documents: The Rise of Steganography
#security #dataprotection #insiderthreats #dataloss #dataleakprevention #dataleakprotection #steganography #documentmanagement
https://hackernoon.com/exploring-substitutes-for-confidential-watermarks-on-documents-the-rise-of-steganography
#security #dataprotection #insiderthreats #dataloss #dataleakprevention #dataleakprotection #steganography #documentmanagement
https://hackernoon.com/exploring-substitutes-for-confidential-watermarks-on-documents-the-rise-of-steganography
Hackernoon
Exploring Substitutes for Confidential Watermarks on Documents: The Rise of Steganography
This article examines the advantages and drawbacks of replacing traditional confidential watermarks with steganography to deter leaks of sensitive documents.