Rebecca RoyalInvestigating UNC5537: Snowflake Database Threat CampaignDetect and Investigate Threats in SnowflakeSep 16Sep 16
Jake BerkowskyA guide to reporting on developer security with Snyk and SnowflakeA new integration between Snowflake and Snyk makes analytics on developer security data easy. This guide shows how to get started.Sep 12Sep 12
KalaGovindarajanUnveiling Fraud in Digital Payments with Snowflake ML FunctionsThe age of the digital era has witnessed numerous advancements since its inception. Digital payments have become a cornerstone of modern…Aug 8Aug 8
Jake BerkowskyImplementing Schema Search on SnowflakeHow to search multiple log sources at onceAug 13Aug 13
Carlos AmaralHow Tenable creates Exposure Scores for IdentitiesThe Tenable One Exposure Management Platform revolutionizes cybersecurity by providing a prioritized view of an organization’s attack…Jul 2Jul 2
Shira MaximovBuilding a Security Data Lake for the Future: Sygnia’s Migration from Elasticsearch to SnowflakeSince transitioning from Elasticsearch to Snowflake, Sygnia has seen a dramatic transformation in operations, eliminated storage…May 14May 14
Ankur AgarwalThreat Intelligence on SnowflakeAuthors: Ankur Agarwal, Manager-Global Security Analytics Prasanth Komini, Sr. Security Engineer Paul Morrissette, Principal Security…May 3May 3
Justin BuiMacOS CI/CD with TartHow Snowflake’s Red Team uses Tart and AWS EC2 for macOS CI/CD and developmentFeb 14Feb 14
Jake BerkowskySecurity Analytics with Wiz and SnowflakeA high value, low effort way to boost your security programFeb 7Feb 7
Jake BerkowskySecurity Data Lakes, Normalization and OCSFThoughts on the Open Cybersecurity Schema Framework and Normalization for Security Data LakesJan 4Jan 4