Systems | Development | Analytics | API | Testing

Security

Policy-Driven Data Obfuscation: What, Why and How

How vulnerable is your sensitive data? Your data policies may put this information at risk of being breached. An ad hoc approach for dealing with this data makes it difficult to maintain your organization’s cybersecurity. Data obfuscation holds the key to improving your security and making it easier to use your data, but it must be driven by your policies to be effective.

Masking Semi-Structured Data with Snowflake

Snowflake recently launched dynamic data masking, an incredibly useful feature for companies and data-centric organizations that have strict security data governance requirements. This article demonstrates how we implemented data masking at Snowflake by introducing a data masking policy on a VARIANT data type field that holds data in JSON format. We implemented the policy on top of tables and views.

Data and Customer Privacy: What Companies Need to Do

Today’s Data Privacy Day offers consumers an opportunity to learn about how companies use, collect, and share their personal information. At the same time, it gives companies a chance to focus on and highlight how they are protecting customer data. Although most businesses view data privacy practices as a way to mitigate their risk, good practices around data privacy can actually differentiate your organization from your competitors.

Cloudera Completes SOC 2 Type II Certification for CDP Public Cloud

We believe security is the cornerstone of any legitimate data platform, and we’re excited to announce that Cloudera has successfully achieved SOC 2 Type II certification for Cloudera Data Platform (CDP) Public Cloud. Achieving our SOC 2 certification is the culmination of significant work across our organization and demonstrates to independent auditors that we adhere to industry-standard security controls and processes.

The Biggest Threat to the Security of Healthcare Data

When cyberattacks take out business systems, organizations suffer from direct and indirect financial losses. When healthcare systems go down, it’s a matter of life and death. Healthcare organizations were already a frequent target of cybercriminals, and the pandemic has made this situation worse. Infosecurity Magazine reports that healthcare data breaches will increase by 3x in 2021, at a time when so many healthcare providers are burnt out and exhausted from battling the pandemic.

Why Software Cybersecurity and Quality Assurance Go Together

Digital data is the new gold, and hackers will stop at nothing to get yours. In a study by cybersecurity experts at Maryland University, researchers found that cyber-attacks happen once every 39 seconds. As one of the first organizations to quantify cyber-attacks, Maryland University also says that these attacks can affect one out of every three U.S. citizens.

What the new WhatsApp Privacy Policy is all about and what it means for you

It was January 2007 when Steve Jobs officially announced the 1st Generation iPhone. At the time, there’s no doubt that he foresaw how the newly created concept of smartphone applications would become part of our everyday life. Fast forward a decade and we now have apps for literally everything, from trackable maps to online shopping, online banking to instant messaging.

Common Regulations that Data-Driven Entities Need to Know

For public and private entities, data collection is a way of life. That fact has led to the proliferation of common regulations to protect consumers and individuals from unacceptable use or storage of their private data. But it's not just data collection laws companies have to adhere to. There are many US-based and international statutes that put constraints on how they do business. What follows summarizes the most common regulations and how they can affect the work you do, day to day.

The Importance of Zero-Trust Security When Making the Microservices Move

Transitioning to microservices has many advantages for teams building large applications that must accelerate the pace of innovation, deployments and time to market. It also provides them the opportunity to secure their applications and services better than they did with monolithic codebases.