Systems | Development | Analytics | API | Testing

Security

Ensuring Trust in Augmented Reality: Addressing the Cybersecurity Conundrum

As Augmented Reality (AR) becomes more prevalent, imagine entering a world where digital overlays seamlessly blend with your physical surroundings, enriching your reality with interactive information and immersive experiences. This is the promise of AR, a groundbreaking technology reshaping how we interact with the digital world.

Exposed: How Secure Are Your Embedded Analytics Really?

The ever-growing threat landscape of hackers, cyberattacks, and data breaches makes data security a top priority, especially when integrating analytics capabilities directly into customer-facing applications. To make informed decisions, it’s crucial to understand how embedded analytics platforms function from a security standpoint.

Enforcement of Apple Privacy Manifest starting from May 1, 2024

Here's how Apple's upcoming Privacy Manifest enforcement, starting May 1, 2024, will change the way app developers handle privacy. Learn the details of the new requirements, from creating privacy manifest files to meeting crucial deadlines, to ensure your app meets Apple's stringent privacy standards.

Cyber Security Testing Toolkit - 9 Must-Have Information Gathering Tools

In the field of cybersecurity, it's important to have a thorough awareness of potential attack surfaces and vulnerabilities in order to stay one step ahead of bad actors. A survey from the Ponemon Institute states that, on average, data breaches cost an astounding $4.45 million worldwide in 2023.

A New Approach to Data Protection and Cyber Resilience

The relentless push for business and digital transformation has put data at the forefront of organizational success. However, the ever-increasing volume and complexity of safeguarding data pose significant challenges. Building an unbreakable data infrastructure is a complex challenge. How do you know what’s good enough when building data infrastructure? This video explores a new approach to data protection and cyber resiliency in securing your most valuable asset.

Complying with Apple's New Privacy Requirements in the App Store

One of the latest changes introduced by Apple is that developers needs to describe the data your app or third-party SDK collects and provide the required reasons of the APIs it uses. To do so, applications and third-party SDKs that are distributed as XCFrameworks, Swift packages, or Xcode projects, need to contain a privacy manifest file, named PrivacyInfo.xcprivacy. Table of Contents.

REST API Security Essentials

Cybersecurity is one of the most prominent and pressing concerns for businesses today. As developers move more of their web applications to a microservices architecture, data is shared by web service APIs now more than ever. Industry analysts predicted that API attacks would become the most common attack vector by the end of this year. Unfortunately, that prediction has come true.

Confidential Computing: Reinforcing Security at the Point of Processing

Confidential computing offers a groundbreaking approach to data security confidentiality, vital for industries like healthcare, finance, and government, where sensitive information reigns supreme. Unlike traditional security measures that center on data at rest or in transit, confidential computing shields data during the processing phase itself.

Snowflake Horizon Demo for Security Admins

In this demo targeted at security admins, Ravi Kumar, Senior Partner Sales Engineer at Snowflake, demonstrates how to govern and discover data, apps, and more in Snowflake Horizon. Learn and try the core capabilities of Snowflake Horizon, such as using the Trust Center to discover security risks with recommendations to resolve them.