Systems | Development | Analytics | API | Testing

Security

Confidential Computing: Reinforcing Security at the Point of Processing

Confidential computing offers a groundbreaking approach to data security confidentiality, vital for industries like healthcare, finance, and government, where sensitive information reigns supreme. Unlike traditional security measures that center on data at rest or in transit, confidential computing shields data during the processing phase itself.

Snowflake Horizon Demo for Security Admins

In this demo targeted at security admins, Ravi Kumar, Senior Partner Sales Engineer at Snowflake, demonstrates how to govern and discover data, apps, and more in Snowflake Horizon. Learn and try the core capabilities of Snowflake Horizon, such as using the Trust Center to discover security risks with recommendations to resolve them.

How Material Security Protects The Privacy The Productivity Suite

Abhishek Agrawal, Co-founder and CEO of Material Security, chats with "Powered by Snowflake" host Phoebe He about his company's mission to protect the productivity suite, namely Microsoft 365 and Google Workspace. Its customer base crosses all industries as well as customers of all sizes. The conversation includes a demo of the platform that shows how to set up the solution and the kind of reports it generates for an organization's security team. It also covers how the solution accounts for organization's who have employees working from home and who use their mobile phones to conduct business communications.

How to Navigate the Costs of Legacy SIEMs with Snowflake

Legacy security information and event management (SIEM) solutions, like Splunk, are powerful tools for managing and analyzing machine-generated data. They have become indispensable for organizations worldwide, particularly for security teams. But as much as security operation center (SOC) analysts have come to rely on solutions like Splunk, there is one complaint that comes up for some: Costs can quickly add up.

How Snowflake Powers The Next Generation Of Cybersecurity Applications

Cybersecurity is extremely data-intensive and complex. Top cybersecurity companies such as Lacework, Sophos, Panther, Hunters, Auditboard, Orca Security, and Dassana leverage Snowflake to provide out-of-the-box solutions. These companies are building the next generation of cybersecurity applications by harnessing the power of the Snowflake Data Cloud to provide differentiated product capabilities to security teams.

Displaying Google Dorking: Revealing Hidden Online Information | Security Testing | BugRaptors

Dive into the realm of Google Dorking, also known as Google Hacking, an advanced method leveraging specialized search queries to unveil concealed data, exposed databases, and potential security vulnerabilities across the web. Join us as we explore the responsible application of this technique for information retrieval and delve into the critical importance of safeguarding against potential risks lurking in the digital landscape.

Calling All White Hat Hackers!

Imagine a world where every piece of digital content can be verified and traced back to its source. Lindsay Walker, Product Lead at Starling Lab for Data Integrity, walks us through the emerging tools that could make this possible. While AI tools hold incredible potential for good, Lindsay also warns against threats and countermeasures needed to keep our virtual representations safe. She emphasizes the need to build provenance into tools, discusses blockchain use cases, and shares systems that implement hashes for security.

Data Security and Compliance: 5 Essential Considerations

With data continuously growing in complexity and quantity, ensuring data security is more important than ever when choosing to buy a business intelligence (BI) solution. From data protection to data governance, having a BI platform that enables you to control, audit, encrypt and manage user access and usage of sensitive data is essential.