Systems | Development | Analytics | API | Testing

Security

How to Mask PII Before LLM Training

Generative AI has recently emerged as a groundbreaking technology and businesses have been quick to respond. Recognizing its potential to drive innovation, deliver significant ROI and add economic value, business adoption is rapid and widespread. They are not wrong. A research report by Quantum Black, AI by McKinsey, titled "The Economic Potential of Generative AI”, estimates that generative AI could unlock up to $4.4 trillion in annual global productivity.

How to Increase Data Processing: Combining SFTP and Heroku

Secure File Transfer Protocol (SFTP), at its core, is a protocol designed to provide secure file transfer capabilities. With an extensive application in web development and IT infrastructures, its primary use case revolves around the encrypted transfer of files between remote servers and local machines.

How to Use SFTP to Securely Transfer Files

Transferring files securely between machines is a fundamental part of the ETL (Extract, Transform, Load) process, which involves extracting data from one source, transforming it for analysis, and loading it into a data warehouse. The challenge? Ensuring these files are both sent and received without interception by malicious entities. For years, FTP (File Transfer Protocol) served as the go-to method to transfer files between a client and server on a network.

How to Get Started with DevSecOps 101 for Embedded Software

DevOps has helped bring software development and IT from the more rigid Waterfall methodology to a more flexible Agile approach, enabling development teams to resolve issues faster, reduce code complexity, and accelerate product delivery. With so many benefits to DevOps, it's natural that a focus on security, using a similar approach, would be the next step for development teams wanting to secure the software development process.

SFTP vs. FTP: Understanding the Difference

When transferring data, especially in the context of Extract, Transform, and Load (ETL), the choice of protocol matters. Both SFTP and FTP provide solutions, but their intrinsic differences could greatly influence the outcome in terms of security and functionality. Here's everything you need to know about SFTP vs. FTP for ETL.

The What's, How's and Why's of SFTP

When it comes to the exposure of data, no other period in history has posed the magnitude of risks and regulations companies face today. Companies in any industry — but particularly those in healthcare, finance, and government — must keep cybersecurity top-of-mind to avoid data breaches of personally identifiable information (PII). Not only are data breaches a threat to company reputation, but compliance issues can also lead to hefty fines and, in extreme cases, imprisonment.

What is API DevSecOps?

API Developer Security Operations or API DevSecOps is a fusion of API development, security practices, and operational efficiency, and represents a holistic approach that navigates the intricate balance between innovation and protection. At its core, API DevSecOps redefines the way organizations create, deploy, and manage APIs, placing security considerations at the forefront without compromising on agility and collaboration.

Critical Role of API Security in the Retail Domain - Challenges and Solutions

The retail sector is in a paradigm shift of digital transformation, with an anticipated 25% of global retail poised to migrate online by 2025. APIs facilitate digital-first shopping experiences in this evolving landscape, allowing retailers to swiftly adapt and enhance their systems. They empower retailers to extend services like online orders with in-store pickups, curbside delivery, and personalized online shopping recommendations, catering to remote customers’ preferences.

Building Airtight Data Security Architecture in Growing Businesses

In the second installment of Mavericks of Data, we have an engaging discussion with Mahesh Krishnan, CTO of Fujitsu Australia and innovator, thought leader, author, speaker, and passionate technologist who has over 30 years of experience in the IT sector. Mahesh talks about his role within Fujitsu, the recent developments and key considerations in data security, setting up data security within growing businesses and the challenges revolving around data sensitivity.