Ben Herzberg
Chief Scientist

Ben is an experienced tech leader and book author with a background in endpoint security, analytics, and application & data security. Ben filled roles such as the CTO of Cynet, and Director of Threat Research at Imperva. Ben is the Chief Scientist for Satori, the DataSecOps platform.

More From Ben Herzberg

Agile Data Governance with Satori
Agile data governance is crucial for organizations using cloud data stores with constantly changing data,...
August 11, 2022
When Does RBAC for Data Access Stop Making Sense?
RBAC is a useful model for access control, however, there are some instances where it...
August 9, 2022
Why Data Engineers Should Take a Step Back from Cloud Data Security
Data engineering teams can spend a significant portion of their valuable time on cloud data...
August 4, 2022
Why Cloud Data Governance is Complicated
Data governance by itself is a complicated procedure that is further compounded when performed in...
August 2, 2022
Access Control: The Dementor of Data Engineering
Data access control is often described as the Dementor of data engineers due to its...
July 26, 2022
Why Data Classification Projects Are So Hard
Data classification projects are a dark cloud for data teams, often appearing randomly and redirecting...
July 21, 2022
Data Security Projects Keep Data Teams Away From Their Core Responsibilities
Data security is critical, however, this task often defaults to already overwhelmed data engineering teams...
July 19, 2022
9 Common Struggles Data Teams Face With Data Masking Projects
Data masking is essential when working with sensitive data. However, there are a number of...
July 12, 2022
How To Piss Off Your Data Consumers With Data Access Bureaucracy
Stakeholders including data consumers are ultimately people. Having an annoying work environment reduces productivity and...
July 7, 2022
Enabling Employee Access To Production Data
Uncontrolled employee access to production environments is an operational challenge, because while access is necessary...
June 30, 2022
Implementing “Need To Know”
Classifying data as "need-to-know" is important for securing sensitive data. In this post we discuss...
June 23, 2022
Benefits of a Consolidated Data Access Platform
Managing security and access policies from a consolidated platform simplifies processes and increases visibility and...
June 9, 2022
Role Explosion in Data Access
One of the common pain points data teams experience in authorizing users to access data...
May 26, 2022
Satori Is Now Available On AWS Marketplace To Simplify Secure AWS Data Access
Making life more simple for our customers not only means striving to deliver the best...
May 18, 2022
Satori Announces #Slack Integration To Simplify Data Access Workflows
One of the most commonly used productivity tools is Slack, and the ability to control...
May 17, 2022
Satori Introduces Automated Data Portals
For years, we have been following our mission of enabling companies to deliver quicker data-driven...
May 16, 2022
Simplifying Data Localization Requirements With Satori
Meeting data localization requirements can be challenging; this post explains how to simplify them with...
April 28, 2022
Satori and Cockroach Labs Partner to Provide Secure, Simple, & Resilient Data Access
Satori and CockroachDB are announcing a partnership that will enable existing and new Satori and...
April 19, 2022
Satori Announces MySQL Support For Secure Data Access
We’re announcing MySQL support in Satori to help companies secure their data access for MySQL...
April 14, 2022
Database Reverse Proxy 101
A proxy server can be a forward proxy where the client directs traffic through a...
March 24, 2022
Asking the Right Question: RBAC vs. ABAC or RBAC AND ABAC?
Before they can access data, users must get authenticated and authorized. In this regard, access...
March 8, 2022
Data Access Orchestration and Its Limitations
In this article, I will give an overview of data access orchestration (not to be...
February 24, 2022
Satori Across Various Deployment Options
Some of the most common questions we, Satorians, encounter are about the many Satori deployment...
February 17, 2022
The Dangers Lurking in Data Swamps
The more data a company collects and stores, the more likely that data can turn...
February 10, 2022
From “Default To Know” to “Need To Know” to “Need To Share”
We all like having our cake and eating it too. In this article, we will...
February 2, 2022
5 Ways to Apply Decryption & De-Tokenization in Snowflake
This article will discuss the distinction between tokenization and encryption and their inverses: decryption and...
January 26, 2022
Metadata Repositories: Data Dictionary vs. Data Inventory vs. Data Catalog
Data dictionaries, inventories, and catalogs are terms often used interchangeably. While they are all critical...
January 19, 2022
Taking Satori for a Test Drive
A lot of thought goes into how to help potential customers try out your product....
January 11, 2022
Writing The Snowflake Security Book
For the last few years, we at Satori have been a bit obsessed with Snowflake....
January 6, 2022
ABAC: An Introduction to Attribute-Based Access Control
Access management has evolved to incorporate need-to-share authorizations in addition to need-to-know information. The authorization...
December 21, 2021
How To Accelerate Data Democratization
The future of data democratization lies in the hands of your end-users. They are already...
December 14, 2021
Simplifying Multiple Snowflake Accounts Management, Security & Governance
One account is not enough. In many cases, organizations using Snowflake use multiple accounts rather...
December 9, 2021
You Have Data, But Is It Accessible?
As the saying goes, “data is the new oil,” as it is quickly becoming an...
November 30, 2021
Satori Joins Snowflake’s Accelerated Data Governance Program
Today, as part of Snowflake’s global Snowday event, we are excited to announce our participation...
November 16, 2021
The Datamasters: Data Owners vs. Data Stewards vs. Data Custodians
There is no such thing as a one-size-fits-all data governance framework that works for all...
November 11, 2021
Using Satori & Collibra To Boost Data Governance and Security
Satori augments your Collibra data governance capabilities and creates a synergy for better DataSecOps across...
November 2, 2021
The Redshift-Tableau-Satori stack for DataSecOps in Data Analytics
Many organizations are using Tableau to empower their BI activities for reporting and analytics. These...
October 27, 2021
Custom Classification: Common Use-Cases
In a previous post, we introduced you to our data classification capabilities. As a recap,...
October 13, 2021
Applying DataSecOps Principles on MLOps
Machine learning has been commoditized in the last decade or so, and I love it....
September 30, 2021
Introducing Custom Data Classification in Satori
When data engineers and other professionals experience Satori for the first time, one aspect they...
September 22, 2021
The Tableau-Snowflake-Satori Stack for Secure Data Democratization
Tableau is one of the most widely used BI tools which provides a wealth of...
September 3, 2021
Amazon Data Lake Security with Athena and Satori
A few years ago, when I first began using Athena, it was a magical and...
August 26, 2021
5 Indicators You’re Doing DataSecOps Wrong
I love hiking as well as outdoor navigation. What I find especially useful for these...
August 18, 2021
Redshift, Looker and Satori: Advanced Data Access
I’m guessing there is no need to introduce you to Amazon Redshift or Google Looker,...
August 11, 2021
Data Classification With Satori
In this article, I will discuss how people perform data classification using Satori and explain...
July 22, 2021
Data Classification Best Practices – Part 2
In the first part of this article, we discussed the many reasons why you should...
July 15, 2021
Snowflake & Looker DataSecOps with Satori
In this post, we will discuss the DataSecOps advantages that Looker users over Snowflake enjoy...
July 8, 2021
Data Classification Best Practices – Part 1
Note: this is part 1 of the guide, in part 2 we discuss the questions...
July 1, 2021
Limiting Snowflake Access to Specific Clients
Before we drill down to the “why” and “how” of limiting client tool access in...
June 24, 2021
Democratize Data in AWS Redshift With Self-Service Data Access Workflows
Amazon Redshift allows companies to analyze large amounts of data, whether the data is stored...
June 17, 2021
Zero to Self-Service Snowflake Data Access Management
Let’s start with good news – if you are using Snowflake and want a simple...
June 9, 2021
Snowflake Security: Best Practices for Stages
This article is also published as a chapter in our Snowflake Security guide, covering many...
May 27, 2021
What is DataSecOps?
History repeats itself. The transition of applications to the cloud and the development of software...
May 12, 2021
Amazon Redshift Auditing & Monitoring
2022-12-01 If you’d like to view the entire guide of AWS Redshift Security topics, visit...
May 4, 2021
The Future of DataSecOps, As Reflected in RSA Innovation Sandbox
Every year, the cybersecurity industry has its biggest conference, the RSA conference in San Francisco...
April 26, 2021
Snowflake Role Hierarchy
Snowflake’s data access modeling is different from many other databases and data warehouses. It’s funny...
April 14, 2021
How to Automate a Data Inventory for AWS Redshift
Many modern organizations are using AWS Redshift clusters to fulfill some or all of their...
March 29, 2021
Redshift Data Masking – Getting It Right
Data masking is the act of transforming parts of data to maintain its anonymity. There...
March 17, 2021
How to Monitor Access to Sensitive Data In Snowflake with Satori
Being optimally focused is the key that helps you spend your resources better. When your...
March 11, 2021
Implementing Row-Level Security with Satori
There are moments when architecting data where you need to make decisions that will have...
March 4, 2021
Data Inventory for Snowflake: Manual vs Automated
The Snowflake Data Cloud helps organizations quickly transition from having a lot of data to...
February 14, 2021
Snowflake Data Masking: Static vs Dynamic
In today’s ever-evolving digital age, data masking is one of the most essential features of...
February 1, 2021
Snowflake Data Access Journey
Let’s understand the chain of events that leads to data access. For example, imagine you...
January 21, 2021
Simplifying Snowflake Roles Management using Satori
A few days ago, I wrote about some of the complexities of managing Snowflake roles...
January 20, 2021
How to Scale Snowflake Roles Management
RBAC, or Role-Based Access Controls, are foundational tenets of good data governance and key to...
January 14, 2021
Benchmarking Snowflake Performance Using TPC-H
“I hate waiting,” asserted Inigo Montoya, the almighty swordmaster from “The Princess Bride.” He is...
December 31, 2020
How to Complete a Safe and Simple Migration to Snowflake
Data migration is not fun. I’ve been there, done that, and I did not like...
December 14, 2020
Satori Universal Data Access Control for AWS Athena
Amazon Athena is a leading cloud query service, utilized to query data stored in S3...
November 29, 2020
Setting up column-level security in Snowflake
“A couple of weeks ago, I wrote a guide about implementing row-level security in Snowflake,...
November 26, 2020
Snowflake Row-Level Security
Row-level security, or row-based security, is a data access control concept in which access to...
November 9, 2020
Data engineers: stuck in the middle?
A data engineering manager sent me this snippet from Stealers Wheel’s famed “Stuck in the...
October 4, 2020
Turn over-privilege risk into a healthy Snowflake DB permission fit
I recently published a lengthy diatribe about the problem of over-permissive access to data, the...
September 17, 2020
Effective GDPR DPIA on cloud data warehouses
Meeting GDPR requirements is important, not only for EU companies but also for any companies...
September 9, 2020
7 Quick Ways to Improve your Snowflake Security
Update – January 12th 2021: Following Snowflake’s preview addition of self-service account creation using the...
September 2, 2020
Hardening GCP BigQuery security: access controls explained
In the spirit of our Snowflake DB security and AWS Redshift security guides, we’ve created...
August 19, 2020
Sensitive Data Isn’t The Crown Jewels
I need to get something off my chest. It’s time for our beloved infosec community...
August 4, 2020
AWS Redshift security: access controls explained
This is part of our complete Amazon Redshift Guide.
June 23, 2020
Snowflake security: access controls explained
If you’d like to read this guide, along with additional guides to specific topics in...
May 26, 2020
Enterprise data protection implementation: why so tough?
Implementing security products, services and solutions in enterprises is intrinsically difficult, especially when coordinating several...
April 27, 2020
How Satori uses Apache Drill to conquer data exploration & preparation
“Laying out data infrastructure for a new product and big-data research is no small task....
March 17, 2020
Washington Privacy Act Passes State Senate: Another Step for Privacy
This week, the Washington senate approved the Washington Privacy Act (WPA) to advance data privacy...
February 19, 2020
Why today’s data access controls don’t work for data-driven organizations
As the world undergoes a data revolution, the ways we generate, store, access, use and...
February 12, 2020
Register Here
The latest posts delivered to your inbox