Systems | Development | Analytics | API | Testing

Security

A New Approach to Data Protection and Cyber Resilience

The relentless push for business and digital transformation has put data at the forefront of organizational success. However, the ever-increasing volume and complexity of safeguarding data pose significant challenges. Building an unbreakable data infrastructure is a complex challenge. How do you know what’s good enough when building data infrastructure? This video explores a new approach to data protection and cyber resiliency in securing your most valuable asset.

Complying with Apple's New Privacy Requirements in the App Store

One of the latest changes introduced by Apple is that developers needs to describe the data your app or third-party SDK collects and provide the required reasons of the APIs it uses. To do so, applications and third-party SDKs that are distributed as XCFrameworks, Swift packages, or Xcode projects, need to contain a privacy manifest file, named PrivacyInfo.xcprivacy. Table of Contents.

REST API Security Essentials

Cybersecurity is one of the most prominent and pressing concerns for businesses today. As developers move more of their web applications to a microservices architecture, data is shared by web service APIs now more than ever. Industry analysts predicted that API attacks would become the most common attack vector by the end of this year. Unfortunately, that prediction has come true.

Confidential Computing: Reinforcing Security at the Point of Processing

Confidential computing offers a groundbreaking approach to data security confidentiality, vital for industries like healthcare, finance, and government, where sensitive information reigns supreme. Unlike traditional security measures that center on data at rest or in transit, confidential computing shields data during the processing phase itself.

Snowflake Horizon Demo for Security Admins

In this demo targeted at security admins, Ravi Kumar, Senior Partner Sales Engineer at Snowflake, demonstrates how to govern and discover data, apps, and more in Snowflake Horizon. Learn and try the core capabilities of Snowflake Horizon, such as using the Trust Center to discover security risks with recommendations to resolve them.

How Material Security Protects The Privacy The Productivity Suite

Abhishek Agrawal, Co-founder and CEO of Material Security, chats with "Powered by Snowflake" host Phoebe He about his company's mission to protect the productivity suite, namely Microsoft 365 and Google Workspace. Its customer base crosses all industries as well as customers of all sizes. The conversation includes a demo of the platform that shows how to set up the solution and the kind of reports it generates for an organization's security team. It also covers how the solution accounts for organization's who have employees working from home and who use their mobile phones to conduct business communications.

How to Navigate the Costs of Legacy SIEMs with Snowflake

Legacy security information and event management (SIEM) solutions, like Splunk, are powerful tools for managing and analyzing machine-generated data. They have become indispensable for organizations worldwide, particularly for security teams. But as much as security operation center (SOC) analysts have come to rely on solutions like Splunk, there is one complaint that comes up for some: Costs can quickly add up.