Mike MitrowskiPractical Security Checklist for the WFH Network(Originally Published March 2020)Dec 27, 2023Dec 27, 2023
Mike MitrowskiQuick, Easy, & Free* Tools to up your Security GameMinimal effort security enhancements to Prevent-Detect-Respond to the wide range of cyber threats posing a risk to your business and…Dec 27, 2023Dec 27, 2023
Mike MitrowskiSquid Proxy Reference Architecture (Transparent Proxy) to Snowflake Enterprise Edition use caseCustomers often request to integrate with a web proxy solution; to allow access to certain well-known domains (for example, Snowflake…Dec 26, 2023Dec 26, 2023
Mike MitrowskiOAuth 2.0 Client Credentials Flow to Snowflake (External OAuth)With machine-to-machine (M2M) applications; such as CLIs, daemons, or services running on your back-end, the system authenticates and…Nov 26, 2023Nov 26, 2023