Data Security in MySQL is an evolving compliance and threat landscape
Min-Hank Ho, VP Product Management | | Data encryption, Data Security, mysql, privacy regulations, sensitive data
MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only for those who purchase and use the ...
Baffle Helps Develop IBM’s Groundbreaking Data Security Broker
Ameesh Divatia, CEO and co-founder | | Cloud, Data encryption, IBM, privacy regulations, sensitive data
Baffle powers IBM to deliver data-centric protection with Cloud Security and Compliance Center Data Security Broker The post Baffle Helps Develop IBM’s Groundbreaking Data Security Broker appeared first on Baffle ...
Baffle’s Proxy Architecture
Billy VanCannon, Director of Product Management | | Cloud, data access, Multi-Tenant Key, no-code, pec, Privacy Enhanced Computation, TDE, Transparent Data Encryption
Baffle implements database encryption and role-based access control using a reverse proxy configuration that operates at the SQL session layer. This blog will explore what that means and compare it to competing ...
Privacy Enhanced Computation Technologies Advantages and Disadvantages
Laura Case, Director of Product Management | | analytics, Data encryption, Privacy Enhanced Computation, privacy regulations, sensitive data
Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies. The post Privacy Enhanced Computation Technologies Advantages and Disadvantages appeared first ...
Data Tokenization and Masking with Baffle in Amazon Redshift
Billy VanCannon, Director of Product Management | | AWS Redshift, data pipeline, Data Security, Data Warehouse, Kafka, Masking, PCI, PHI, pii, Redshit, Tokenization
Security and compliance for sensitive data in your cloud data pipeline and warehouse while running data analysis. The post Data Tokenization and Masking with Baffle in Amazon Redshift appeared first on Baffle ...
Announcing Baffle Advanced Encryption
Laura Case, Director of Product Management | | analytics, Data encryption, privacy regulations, sensitive data
Baffle Advanced Encryption is the easiest fastest, and most flexible way to analyze your regulated data while meeting compliance requirements The post Announcing Baffle Advanced Encryption appeared first on Baffle ...
The Updated EU-US Data Privacy Framework: Enhancing Trans-Atlantic Data Privacy
The new Trans-Atlantic Data Privacy Framework will bring about an unprecedented change in how data privacy is regulated and safeguarded. In this post we discuss its significance and how Baffle Data Protection ...
Advantages and Disadvantages of Homomorphic Encryption 2023
Four years after our first blog on homomorphic encryption, we revisit the technology to see what's changed to make it viable for enterprises. The short answer: not much. The post Advantages and ...
Is data masking the same as data encryption?
Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always mutually exclusive, there are some key differences ...
A look into the file-transfer attack (and how to protect your data)
Billy VanCannon, Director of Product Management | | Accellion, CL0P, clop, File Transfer Hack, File Transfer Security, GoAnywhere, MOVEit
A discussion of recent Fortra, Accellion, and Progress Software file transfer attacks and the security measures that could be used to prevent them. The post A look into the file-transfer attack (and ...