Systems | Development | Analytics | API | Testing

What is the Best Way to Move My Data Securely?

Moving data from an organization’s systems into data warehouses and data lakes are essential to fuel business intelligence and analytics tools. These insights guide businesses into making decisions backed by data, allowing them to choose actions that have the best chance of positive growth. However, getting data from the source systems to these data stores can be a harrowing process.

How To Transfer Flat Files Using SFTP With Xplenty

What is SFTP and What Does It Stand For? SFTP is a network protocol for securely transferring, accessing, and managing files on a remote computer. The SFTP protocol is intended as a more secure alternative to the traditional FTP protocol. The term SFTP stands for SSH File Transfer Protocol, where SSH is a cryptographic protocol that allows clients and servers to connect remotely. The files that you send or receive using SFTP are protected by SSH encryption in transit. This added layer of security means that SFTP is preferable to FTP in the vast majority of cases.

The Journey to Processing PII in the Data Cloud

During the process of turning data into insights, the most compelling data often comes with an added responsibility—the need to protect the people whose lives are caught up in that data. Plenty of data sets include sensitive information, and it’s the duty of every organization, down to each individual, to ensure that sensitive information is handled appropriately.

What is Data Portability and Why is It Important?

Businesses are now storing more personal data on their customers than ever before—from names, addresses, and credit card numbers to such as IP addresses and browsing habits. Understandably, many consumers are speaking up and pushing back on how these businesses use their data—including an insistence on the “right to data portability.” Data portability is an essential issue for companies that must comply with regulations such as the GDPR and CCPA.

5 Steps to Serverless Security With the AWS Lambda Plugin

For the DevOps-averse developer, lambdas are heaven. They can focus on writing self-contained and modularized pieces of code, deploying these functions for on-demand execution without being concerned about resource management or infrastructure. Lambda execution , however, can be tricky. Serverless security with the AWS API Gateway can feel daunting, especially when all you want to do is call a simple function as an API endpoint. For this, there’s the ease of Kong Gateway .

Balancing Innovation and Security With Automation [Destination: Automation]

You feel like you need to clone yourself to scale and maintain security — there simply aren’t enough hours in the year to do it all. Luckily, there’s an automation solution that allows you to get close to cloning how you would normally manage your full API delivery pipeline. Join Peggy Guyott, senior customer experience manager at Kong, and Ned Harris, solutions engineer at Kong, as they share ways you can eliminate the conflict between developers’ need for autonomy and freedom to innovate, and the need to maintain control of governance and security.

Securing Your SQL Server Application: Enabling Client-Initiated Encrypted Connections

In the previous article we discussed how to enable a server initiated encrypted connection to a Microsoft SQL Server. But what if we have a scenario where we do not want to incur the overhead of encryption for every application? In that scenario instead of configuring the server to force encryption we will instead need the client to initiate the encrypted connection.

What Is Homomorphic Encryption?

Data encryption is one of the smartest things any organization can do to protect the privacy and security of confidential and sensitive data. Using a unique encryption key, data is converted to an intermediate representation known as “ciphertext,” which usually appears as a jumbled mixture of letters and numbers to the human eye. This encrypted data will be meaningless to anyone without the corresponding decryption key—even malicious actors who breach an organization’s defenses.

Understanding BigQuery data governance

Want everyone in your organization to be able to easily find the data they need, while minimizing overall risk, and ensuring regulatory compliance? In this episode of BigQuery Spotlight, we’ll examine BigQuery data governance so you can ensure your data is secure. We’ll also go over Cloud Data Loss Prevention and an open-source framework for data quality validation.