ALTR Brief: Snowflake Cybersecurity Investigation

BLOG

Discover the Latest Trends & Best Practices in Data Security

Data Security for Databricks

Unlocking Data Security with Databricks: An Intro for Modern Organizations

Format-Preserving Encryption: A Deep Dive into FF3-1 Encryption Algorithm

The CISO’s Dilemma: Securing Snowflake’s ACCOUNTADMIN Role

How Cloud Data Security Enables Business Outcomes without Sacrificing Compliance

8 Signs It’s Time to Leverage Data Tokenization

What is Format-Preserving Encryption & Why It’s the Missing Piece in Your Security Strategy

How dbt Contracts and Constraints Lock Down Data Pipeline Security

Data Security for Generative AI: Where Do We Even Begin?

Unleashing the Power of FPE: ALTR Key Sharing Meets Snowflake Data Sharing

Data Protection at Snowflake Scale

5 Reasons Why ALTR is the Future of Data Security for Snowflake Users

9 Signs Your Data Access Control Is Out of Control

Data Security Posture Management vs Data Security Platform

The Urgency for Scalability in Data Security

How Much Data Security is Enough

Mandiant Threat Hunting Guide for Snowflake: ALTR Summary

From Conundrum to Compliance: Simplifying Data Security in a Regulatory World

FPE vs Tokenization vs TSS

ALTR Brief: Snowflake Compromised Customer Accounts

ALTR Brings Game-Changing Format-Preserving Encryption to Snowflake Marketplace

The DIY Trap: Why Engineers Should Ditch Manual Masking Policies in Snowflake

Snowflake Arctic & The Future of AI Governance

Agile Data Governance: Are You Drowning in Rigidity or Thriving in the Data Stream?

DSPM v DSP v Discovery – Oh My

The 2024 Guide to U.S. Data Privacy Protection Laws

Free Your A-Team from Data Janitorial Duties

Step Into the Next Generation of Data Security

Is It Time to Revisit Your Data Security Policy?

Format-Preserving Encryption vs Tokenization

Vaulted Tokenization vs Vaultless Tokenization: Key Points to Consider

10 Signs Your Data Access Control Is Falling Apart

The Anatomy of AI Governance

Data Democratization: Building a Culture of “Data Citizens” for Faster, Smarter Decisions

Essential Data Governance Metrics You Should Be Tracking

How to Build a Data Governance-Centric Company Culture

2024 Data Governance Trends and Predictions

ALTR Featured as a Partner of the Snowflake Horizon Ecosystem

Harnessing Automation for Effective Data Access Control

Q4 2023 ALTR Product: Helping Data Teams Ensure Data Security Earlier in the Data Lifecycle

Privacy by Design: The Paradigm Shift That Secures Our Digital Future

Why DIY Data Governance Fails Miserably

Why Tomorrow is Too Late for Data Governance and Security

What is Data De-identification & Why Is It Necessary?

Automated Data Access Governance at Scale with ALTR

AI and LLM Data Security: Strategies for Balancing Innovation and Data Protection

10 Terrifying Consequences of Uncontrolled Data Access

The Crucial Collaboration Between CISOs and CDOs in Data Governance and Security

Navigating GDPR: A Comprehensive Guide to Achieving Regulatory Compliance

11 Data Security Mistakes You Should Never Make

Security in a Modern Business Intelligence Architecture

Mastering Data Classification for Security and Efficiency: A Complete Guide

Data Security Essentials for Cloud Migration

Shift Left: Why Governing and Securing Data from Source to Cloud Is Mission Critical

Snowflake Views: DIY vs ALTR

3 Dimensions to Determining the Right Role-Based Access Controls

Bad Habits Data Governance and Data Security Teams Need to Break

What is Data Masking: An Expert Guide to Safeguarding Your Sensitive Data

ALTR’s Integration Tokenizes Data Automatically in the Matillion Data Pipeline

Building a Modern Credit Union Data Stack on the Cloud

Govern Snowflake Data Shares with Views

Govern Snowflake Data Shares with Views

Codex, ALTR, Matillion for Better Data Protection

Codex, ALTR, Matillion for Better Data Protection

Snowflake Tokenization: DIY vs ALTR

Data Governance and Security Extended to Snowflake Snowpark

Snowflake Data Governance Best Practices

ALTR’s 2023 Vision: One Solution to Govern and Secure Data Wherever It Lives

6 Must-Haves for Mastering Data Governance

Why Open-Source Data Governance Integrations?

Top 10 Questions About Your Snowflake Sensitive Data

Snowflake Rate Limiting: DIY vs ALTR

PII Security – Your Complete Guide to Protecting Personally Identifiable Data

Snowflake Data Classification: DIY vs ALTR

ALTR vs Other Snowflake Data Governance Solutions

The 2023 Data Governance Landscape: Setting Data Privacy Goals

Snowflake Row-Level Security: DIY vs ALTR

Cloud Data Migration: A Complete Guide

BIY Isn’t the Answer to Snowflake Data Access Control

Modern Data Ecosystem Tools – A Complete Guide

Snowflake Data Governance: Which Solution is Best?

Data Mesh Has Ensnared the Data Ecosystem (and That’s Not a Bad Thing)

What is Data Tokenization – A Complete Guide

Why You Need an “Okta” for Cloud Data Access

What Attributes Should a Modern Data Team Have?

Snowflake Masking Policy: DIY vs ALTR

Tokenization vs Encryption: Which is Best for Cloud Data Security?

What is Data Governance – a Complete Guide

4 Steps to a Successful BI Governance Strategy

Data Modernization, Regulation, Democratization and the CDO

Modern Data Ecosystem: Navigating the New Reality

Data Governance for Financial Services

Do You Know What Your Tableau Users Are Doing in Snowflake?

CISOs: 100% Responsible for Cloud Data Security with 0% Control

Moving to the Cloud Doesn’t Have to Be Daunting for Small and Mid-size Financial Institutions

Data is the Fuel Powering the 4th Industrial Revolution

The Hidden Power of Data Observability

RBAC vs ABAC vs PBAC: Why “Why?” is the Most Important Question in Data Access Control

Checks and Balances in your Cloud Data Warehouse Security

Snowflake’s Continued Investment in Extensibility Enables Powerful Cloud Data Capabilities with Partners

PII vs PCI: Why PII is the new PCI

Why Shouldn’t You Use a Cloud Proxy for Data Security?

Offensive vs. Defensive Data Strategy: Why Not Both?

Multi-Cloud Data Governance and Security

Why Is Data So Hard to Protect?

Human Threats to Your Data