Systems | Development | Analytics | API | Testing

Security

CyberNews + Countly: Safe and Successful Customer Journeys Make Organizations Relevant

Cybersecurity research website CyberNews recently interviewed Countly’s CEO, Onur Alp Soner, discussing everything from Countly’s origins to the role of cybersecurity in product analytics and how this might shape digital products in the near future.

Built with BigQuery: How Exabeam delivers a petabyte-scale cybersecurity solution

Exabeam, a leader in SIEM and XDR, provides security operations teams with end-to-end Threat Detection, Investigation, and Response (TDIR) by leveraging a combination of user and entity behavioral analytics (UEBA) and security orchestration, automation, and response (SOAR) to allow organizations to quickly resolve cybersecurity threats.

Panther Brings Speed, Scale, and Flexibility to Security Analytics

Security practitioners are drowning in data, says Will Lowe, Chief Operating Officer at Panther. That’s why when Panther set out to create a new kind of security platform, it chose to build it around Snowflake. “We needed not just a technical partner, but a go-to-market partner. We needed alignment in the vision that security is a data problem. And Snowflake had that in spades.”

Fraud Detection with Cloudera Stream Processing Part 1

In a previous blog of this series, Turning Streams Into Data Products, we talked about the increased need for reducing the latency between data generation/ingestion and producing analytical results and insights from this data. We discussed how Cloudera Stream Processing (CSP) with Apache Kafka and Apache Flink could be used to process this data in real time and at scale. In this blog we will show a real example of how that is done, looking at how we can use CSP to perform real-time fraud detection.

Build secure mobile applications with Anastasiia Voitova | Mobile DevOps is a Thing! Podcast

In this episode, we talked about all aspects of app security: the benefits of integrating end-to-end security checks, zero knowledge and zero trust architectures, and cryptography best practices. We’ve seen in the past few years that DevSecOps is on the rise and sophisticated mobile teams take app security very seriously. However, there’s still a large gap between these teams and those who take it less seriously, and often see security as the necessary evil.

Announcing new BigQuery capabilities to help secure sensitive data

In order to better serve their customers and users, digital applications and platforms continue to store and use sensitive data such as Personally Identifiable Information (PII), genetic and biometric information, and credit card information. Many organizations that provide data for analytics use cases face evolving regulatory and privacy mandates, ongoing risks from data breaches and data leakage, and a growing need to control data access.

Fraud Processing With Cloudera Stream Processing

SQL Stream Builder, part of Cloudera Stream Processing offering, allows developers and analysts to write streaming applications using industry-standard SQL. In this video, you will learn the interactive experience with syntax checking, error reporting, schema detection, query creation, and creating outputs on fraud detection with its powerful interface and APIs.

Identity Verification and KYC in a Digital Age

Identity verification is a crucial step in ensuring someone is who they say they are. This idea is brought through digital identity verification. This reduces the effects of individuals from creating a fraudulent identity, engaging in fraud-related crimes, or acting without the permission of someone else. Organizations must detect the identity of an individual as they manage many prominent security issues like identity theft, data breaches, and fraudulent transactions.