Systems | Development | Analytics | API | Testing

Security

5 Lessons We Learned Validating Security Controls at Snowflake

You may have read about Snowflake’s IPO last year. But you probably didn’t hear about all the work that the Snowflake security team did in preparation. Our corporate security program went through a security analytics review to ensure that it satisfied the new security policy requirements resulting from the IPO. Here are a few lessons that we learned when setting up automated security control validation on our Snowflake security data lake.

CDP Public Cloud: SSH Key Deployment

This video covers how to deploy SSH keys in CDP Public Cloud. It touches on how to generate a new SSH key pair and steps through the process of deploying it for a workload user through the Cloudera Management Console Web UI, as well as using the CDP command-line tool. It discusses the security implications of using the Cloudbreak user for login on data hub hosts, and explains why workload user credentials should be used instead in most cases. It also demonstrates using the deployed SSH keys for login to data hub hosts.

Policy-Driven Data Obfuscation: What, Why and How

How vulnerable is your sensitive data? Your data policies may put this information at risk of being breached. An ad hoc approach for dealing with this data makes it difficult to maintain your organization’s cybersecurity. Data obfuscation holds the key to improving your security and making it easier to use your data, but it must be driven by your policies to be effective.

Masking Semi-Structured Data with Snowflake

Snowflake recently launched dynamic data masking, an incredibly useful feature for companies and data-centric organizations that have strict security data governance requirements. This article demonstrates how we implemented data masking at Snowflake by introducing a data masking policy on a VARIANT data type field that holds data in JSON format. We implemented the policy on top of tables and views.

Data and Customer Privacy: What Companies Need to Do

Today’s Data Privacy Day offers consumers an opportunity to learn about how companies use, collect, and share their personal information. At the same time, it gives companies a chance to focus on and highlight how they are protecting customer data. Although most businesses view data privacy practices as a way to mitigate their risk, good practices around data privacy can actually differentiate your organization from your competitors.

Cloudera Completes SOC 2 Type II Certification for CDP Public Cloud

We believe security is the cornerstone of any legitimate data platform, and we’re excited to announce that Cloudera has successfully achieved SOC 2 Type II certification for Cloudera Data Platform (CDP) Public Cloud. Achieving our SOC 2 certification is the culmination of significant work across our organization and demonstrates to independent auditors that we adhere to industry-standard security controls and processes.

The Biggest Threat to the Security of Healthcare Data

When cyberattacks take out business systems, organizations suffer from direct and indirect financial losses. When healthcare systems go down, it’s a matter of life and death. Healthcare organizations were already a frequent target of cybercriminals, and the pandemic has made this situation worse. Infosecurity Magazine reports that healthcare data breaches will increase by 3x in 2021, at a time when so many healthcare providers are burnt out and exhausted from battling the pandemic.

Why Software Cybersecurity and Quality Assurance Go Together

Digital data is the new gold, and hackers will stop at nothing to get yours. In a study by cybersecurity experts at Maryland University, researchers found that cyber-attacks happen once every 39 seconds. As one of the first organizations to quantify cyber-attacks, Maryland University also says that these attacks can affect one out of every three U.S. citizens.

What the new WhatsApp Privacy Policy is all about and what it means for you

It was January 2007 when Steve Jobs officially announced the 1st Generation iPhone. At the time, there’s no doubt that he foresaw how the newly created concept of smartphone applications would become part of our everyday life. Fast forward a decade and we now have apps for literally everything, from trackable maps to online shopping, online banking to instant messaging.