Systems | Development | Analytics | API | Testing

How Thrivent Uses Real-Time Data for AI-Driven Fraud Detection

In today’s fast-paced financial services landscape, customers have a shorter attention span than ever. To meet clients’ growing demands for real-time access to information and keep innovating in areas like fraud detection and personalized financial advice, Thrivent needed to overhaul its data infrastructure. With data scattered across siloed legacy systems, diverse tech stacks, and multiple cloud environments, the challenge was a bit daunting. But by adopting Confluent Cloud, Thrivent was able to unify its disparate data systems into a single source of truth.

Subdomain takeover: ignore this vulnerability at your peril

The Domain Name System (DNS) is often described as the address book of the Internet. A and AAAA records map a human-friendly hostname like honeybadger.io to some machine-friendly IP address like 104.198.14.52. Other types of DNS records also exist; in particular, CNAME records are records that map a hostname to some other hostname, thereby delegating IP resolution to the latter.

How to Manage Your API Policies with OPA (Open Policy Agent)

APIs are essential to modern applications, but managing access and security policies can be complex. Traditional access control mechanisms can fall short when flexible, scalable, and fine-grained control over who can access specific resources is needed. This is where OPA (Open Policy Agent) steps in. OPA provides a unified framework for consistently defining and enforcing policies across microservices, APIs, Kubernetes clusters, and beyond. Consistent policy management is essential for enterprises.

5 Ways Perforce Helps with DORA Regulation Compliance

In January 2025, the European Union (EU) will begin enforcing a new regulation called the Digital Operational Resilience Act (DORA). The DORA regulation mandates sweeping cyber resilience requirements for financial institutions and third-party information and communication technology (ICT) providers. In this blog post, we examine how two core Perforce offerings help financial institutions and their supporting ecosystem of service providers comply with the requirements laid out in the DORA regulation.

The Five Pillars of Customer Identity and Access Management #WordsUnplugged

Customer Identity and Access Management (CIAM), a subgenre of IAM, enables organizations to scale and ensure secure, seamless digital experiences for their customers, while collecting and managing customer identity data purposefully. Powerful CIAM solutions provide a variety of key features including customer registration, social logins, account verification, self-service account management, consent and preference management, single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication as well as other nice-to-have features.

SFTP to SFTP: Secure File Transfers for Modern Data Integration

Table of Contents Secure File Transfer Protocol (SFTP) has become an indispensable tool for organizations needing to securely move files between systems. With its robust encryption and reliability, SFTP ensures sensitive data is transferred in a way that meets modern security standards.
Featured Post

The Five Critical Pillars of Customer Identity and Access Management

In today's interconnected digital landscape, effective management of customer identities is not just a technical requirement but a strategic asset. Customer identity and access management (CIAM) systems are at the heart of this, ensuring secure and seamless user experiences across numerous digital interfaces. Whether for individual consumers or business clients, CIAM facilitates personalised interactions while safeguarding sensitive data, complying with global regulations, and improving business enablement and operational efficiency.

Protecting Customer Data In A Collaborative, Data-Sharing World | OneTrust

In this episode of "Powered by Snowflake," we hear from Ojas Rege, GM of Privacy and Data Governance at OneTrust, about his company's consent and privacy platform, a platform that helps organizations manage customer data in a way that allows for data sharing and collaboration without compromising data security and customer privacy. The conversation includes a discussion about the role Snowflake technology plays in providing this kind of capability as well as an in-depth demo of the OneTrust Snowflake Native Application.

Enhancing Security with IAM Roles in Confluent Managed Connectors

As cloud environments evolve, so must the security measures that protect them. With Confluent’s latest enhancement—AWS IAM role integration for managed connectors—you can now adopt temporary security credentials, reducing both the risk of long-term credential exposure and the operational burden of key management. This feature tightens security and simplifies access management for your data flows between AWS and Confluent Cloud.