BLOG HIGHLIGHT

How to De-identify and Secure PII in Snowflake

How to use Skyflow with Snowflake to de-risk and de-scope data privacy, security, and compliance from Snowflake's Data Cloud.

Explore Blogs

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Type
Topic
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Type
Topic
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
All
No items found.
February 22, 2023

What is Fine-Grained Access Control for Sensitive Data?

Learn about fine-grained access control and what’s required to implement fine-grained access controls to govern sensitive data.
All
No items found.
February 1, 2023

What Is CPRA?

Learn how California’s CPRA differs from its predecessor, CCPA, and how Skyflow can help ensure compliance.
All
Data Security
January 19, 2023

What is Secure Multi-Party Computation?

Learn about secure multi-party computation, its history, and its applications for protecting sensitive data.
All
B2B
B2C
Data Security
Data Privacy Vault
January 9, 2023

BambuMeta & Skyflow: Building the Future of Digital Retail

Learn why BambuMeta works with Skyflow to help brands engage with consumers and build trust across an evolving omnichannel retail landscape.
All
Data Privacy Vault
Data Security
Finance
Healthcare
December 16, 2022

Sensitive Data Protection and Data Residency In Australia

Learn how businesses in Australia and across the globe can protect the privacy of sensitive data and meet healthcare data residency requirements.
All
Finance
Data Security
Data Privacy Vault
December 15, 2022

Data Residency and PCI Compliance: Why Apaya Chose Skyflow

Learn why Apaya chose Skyflow to solve data residency and payment processing challenges for their customers while protecting sensitive data.
All
Cloud
B2C
Data Security
November 29, 2022

RBAC vs ABAC: Access Control for Sensitive Data

This post looks at the pros and cons of role based and attribute based approaches to access control, and a new policy-based approach.
All
B2C
Data Privacy Vault
Developer
November 15, 2022

Running Secure Workflows with Sensitive Customer Data

Learn how a data privacy vault supports sensitive data workflows to transform, process, and utilize customer PII within a zero trust vault.
All
No items found.
November 11, 2022

What is Data Residency & How Can a Data Privacy Vault Help?

Learn how a data privacy vault can help you to manage data residency requirements, wherever your customers are located.
All
Data Security
Developer
November 10, 2022

Tokenization vs. Encryption, and When to Use Them

Learn the key differences between tokenization and encryption, when to use them, and how they complement each other.
All
B2C
Data Privacy Vault
Developer
Cloud
Finance
October 20, 2022

The Limitations of Traditional Tokenization

Learn how to overcome the limitations of traditional approaches to tokenization to improve your handling of sensitive data.
All
No items found.
October 13, 2022

Dynamic Access Control of Sensitive User Data

Learn how to give users and systems just the sensitive data access they need by using context-aware authorization.
All
Data Security
Developer
Data Privacy Vault
October 4, 2022

Multiple Payment Gateways: The Why and How

Learn how companies use multiple payment gateways to improve their user experience, reduce costs, and expand into new markets.
All
Data Security
Data Privacy Vault
Cloud
Finance
September 29, 2022

How to Store CVV Codes and Other Transient Data

Learn how you can cache card verification codes (CVVs) to retry transactions while staying compliant with PCI DSS requirements that forbid storing CVVs.
All
Data Security
Finance
Healthcare
September 14, 2022

Maximize Privacy while Preserving Utility for Data Analytics

Learn how you can maximize the privacy of sensitive customer data without sacrificing data utility for analytics.

No result found

Explore More

Podcasts

Our podcast “Partially Redacted” brings together leaders in engineering, data, AI, security, and privacy to share knowledge, best practices, and real world experience.

Resource Library

Discover how to build more secure and compliant products by checking out our data privacy content.