Systems | Development | Analytics | API | Testing

Security

A Look At Gurucul's Threat Detection, Investigation, And Response Platform

In this episode of "Powered by Snowflake, host Julian Forero chats with Nilesh Dherange, Co-founder and CTO of Gurucul, about data, cybersecurity, and machine learning in the context of Gurucul's threat detection, investigation, and response platform. Founded in 2010, Gurucul's mission has always been to bring together different silos of cybersecurity data. In this conversation, Nilesh provides an in-depth demo showing how the platform works, while explaining how its capabilities have advanced over time through the use of machine learning models and the adoption of Snowflake as one of its supported data lakes.

Ensuring Trust in Augmented Reality: Addressing the Cybersecurity Conundrum

As Augmented Reality (AR) becomes more prevalent, imagine entering a world where digital overlays seamlessly blend with your physical surroundings, enriching your reality with interactive information and immersive experiences. This is the promise of AR, a groundbreaking technology reshaping how we interact with the digital world.

Exposed: How Secure Are Your Embedded Analytics Really?

The ever-growing threat landscape of hackers, cyberattacks, and data breaches makes data security a top priority, especially when integrating analytics capabilities directly into customer-facing applications. To make informed decisions, it’s crucial to understand how embedded analytics platforms function from a security standpoint.

Managing Application Auth for Different Audiences

Let’s pose a hypothetical scenario. You're the API product owner at the Paris, Texas Regional Airport. You're in charge of two main APIs: Flights API and Scheduling API. Flights API is primarily used by local research institutions that are interested in read-only access to information about departures and arrivals. Scheduling API is primarily used by airline partners who are interested in updating information about their flights and gates.

Enforcement of Apple Privacy Manifest starting from May 1, 2024

Here's how Apple's upcoming Privacy Manifest enforcement, starting May 1, 2024, will change the way app developers handle privacy. Learn the details of the new requirements, from creating privacy manifest files to meeting crucial deadlines, to ensure your app meets Apple's stringent privacy standards.

Cyber Security Testing Toolkit - 9 Must-Have Information Gathering Tools

In the field of cybersecurity, it's important to have a thorough awareness of potential attack surfaces and vulnerabilities in order to stay one step ahead of bad actors. A survey from the Ponemon Institute states that, on average, data breaches cost an astounding $4.45 million worldwide in 2023.

A New Approach to Data Protection and Cyber Resilience

The relentless push for business and digital transformation has put data at the forefront of organizational success. However, the ever-increasing volume and complexity of safeguarding data pose significant challenges. Building an unbreakable data infrastructure is a complex challenge. How do you know what’s good enough when building data infrastructure? This video explores a new approach to data protection and cyber resiliency in securing your most valuable asset.

Complying with Apple's New Privacy Requirements in the App Store

One of the latest changes introduced by Apple is that developers needs to describe the data your app or third-party SDK collects and provide the required reasons of the APIs it uses. To do so, applications and third-party SDKs that are distributed as XCFrameworks, Swift packages, or Xcode projects, need to contain a privacy manifest file, named PrivacyInfo.xcprivacy. Table of Contents.