Systems | Development | Analytics | API | Testing

Security

The Journey to Processing PII in the Data Cloud

During the process of turning data into insights, the most compelling data often comes with an added responsibility—the need to protect the people whose lives are caught up in that data. Plenty of data sets include sensitive information, and it’s the duty of every organization, down to each individual, to ensure that sensitive information is handled appropriately.

What is Data Portability and Why is It Important?

Businesses are now storing more personal data on their customers than ever before—from names, addresses, and credit card numbers to such as IP addresses and browsing habits. Understandably, many consumers are speaking up and pushing back on how these businesses use their data—including an insistence on the “right to data portability.” Data portability is an essential issue for companies that must comply with regulations such as the GDPR and CCPA.

Balancing Innovation and Security With Automation [Destination: Automation]

You feel like you need to clone yourself to scale and maintain security — there simply aren’t enough hours in the year to do it all. Luckily, there’s an automation solution that allows you to get close to cloning how you would normally manage your full API delivery pipeline. Join Peggy Guyott, senior customer experience manager at Kong, and Ned Harris, solutions engineer at Kong, as they share ways you can eliminate the conflict between developers’ need for autonomy and freedom to innovate, and the need to maintain control of governance and security.

5 Steps to Serverless Security With the AWS Lambda Plugin

For the DevOps-averse developer, lambdas are heaven. They can focus on writing self-contained and modularized pieces of code, deploying these functions for on-demand execution without being concerned about resource management or infrastructure. Lambda execution , however, can be tricky. Serverless security with the AWS API Gateway can feel daunting, especially when all you want to do is call a simple function as an API endpoint. For this, there’s the ease of Kong Gateway .

Securing Your SQL Server Application: Enabling Client-Initiated Encrypted Connections

In the previous article we discussed how to enable a server initiated encrypted connection to a Microsoft SQL Server. But what if we have a scenario where we do not want to incur the overhead of encryption for every application? In that scenario instead of configuring the server to force encryption we will instead need the client to initiate the encrypted connection.

What Is Homomorphic Encryption?

Data encryption is one of the smartest things any organization can do to protect the privacy and security of confidential and sensitive data. Using a unique encryption key, data is converted to an intermediate representation known as “ciphertext,” which usually appears as a jumbled mixture of letters and numbers to the human eye. This encrypted data will be meaningless to anyone without the corresponding decryption key—even malicious actors who breach an organization’s defenses.

Understanding BigQuery data governance

Want everyone in your organization to be able to easily find the data they need, while minimizing overall risk, and ensuring regulatory compliance? In this episode of BigQuery Spotlight, we’ll examine BigQuery data governance so you can ensure your data is secure. We’ll also go over Cloud Data Loss Prevention and an open-source framework for data quality validation.

Make your data more secure than ever with Talend Data Fabric

At Talend, we believe achieving healthier data is essential for business success. Safeguarding private data and staying in compliance with global regulations leads to healthier data by significantly decreasing risk – reducing the potential of having to pay dizzying fines or suffering a data breach that destroys customer relationships and trust.

Keep your cloud close and your data closer

Everyone knows that more and more data is moving to the cloud. According to the latest research, 94% of all enterprises use cloud services and 48% of businesses store classified and important data in the cloud. While the cloud is ubiquitous, in practice it consists of data infrastructures in various locations around the world. The question of where the cloud data infrastructure storing your specific data is located is becoming increasingly important.