Systems | Development | Analytics | API | Testing

Security

Security and Business Intelligence: Why it Matters

Companies deal with high volumes of data every day. In fact, 51% of businesses realize a positive difference in their bottom line by using their business intelligence (BI) to predict customer trends. According to one source, the BI market may reach close to $30 billion before the end of 2022. With so much money going into data management and so much resulting from it, the need for effective cybersecurity measures continues to grow by the day.

What is HIPAA, and Why is It Important?

Healthcare information is perhaps the most important data in our lives. Your health records can contain your medical history, results of tests and scans, and details of current health insurance. This data is a special class of personally identifiable information, and HIPAA is the law that protects it.

Why Business Intelligence is a Security Risk

Business intelligence (BI) software, such as Microsoft Power Bi, allows organizations to leverage big data and make better business decisions. Select Hub reports that 48 percent of companies place high or critical importance on these solutions. However, BI tools introduce a level of security risk that businesses must address.

Security and ELT - A Tragedy

Extract, Load, Transform, or ELT, is a process that extracts data from the source, loads it directly into a data warehouse or data lake, and then transforms it to make it available for business intelligence tools. It supports all data types, from raw to structured. ELT is a popular way to ingest large volumes of raw data quickly, but it brings many security concerns with it.

5 Tips on Avoiding FTP Security Issues

Flat files are files that contain a representation of a database (aptly named flat file databases), usually in plain text with no markup. CSV files, which separate data fields using comma delimiters, are one common and well-known type of flat file; other types include XML and JSON. Thanks to their simple architecture and lightweight footprint, flat files are a popular choice for representing and storing information.

Security Best Practices + Klocwork

Security best practices are essential to follow when installing any web-based application. Here, we outline the steps for setting up Klocwork, a static code analysis and SAST tool, for secure operations. This process is generally on-premises and behind a firewall. There should be additional precautions taken in the case of exposing anything on the internet. Read along or jump ahead to the section that interests you the most.

Enabling Oracle SSL/TLS Encryption

In our previous post on securing Oracle applications, we discussed how to enable Oracle Native Network Encryption for your client and server. In the conclusion however, we noted some of the shortcomings of using that security mechanism (potential for man-in-the-middle attacks, inability to control secure certificates, etc.). Here we begin to address those issues by instead enabling SSL/TLS encryption between the Oracle client and database.

3 Ways to Protect Your APIs With Kong Konnect and Fastly (Signal Sciences)

Fastly’s next-gen WAF (formerly Signal Sciences) integrates with Kong Konnect to block malicious requests to your services. Kong Gateway provides a robust and secure enterprise API management platform to front web traffic. In partnership, Fastly focuses on Layer 7 application security for that traffic. This article will explain how Kong Konnect and Fastly work together.

Converting HBase ACLs to Ranger policies

CDP is using Apache Ranger for data security management. If you wish to utilize Ranger to have a centralized security administration, HBase ACLs need to be migrated to policies. This can be done via the Ranger webUI, accessible from Cloudera Manager. But first, let’s take a quick overview of HBase method for access control.