Syndicated Blog - Security Boulevard

Syndicated Blog

Redshift De-identification Demo

Protecting Your Data in Your Cloud with the Baffle Data Privacy Cloud

| | Cloud, Privacy
As organizations continue to build out their cloud-based data lakes and analytics environments, there’s a huge push to implement data privacy and de-identification methods for their data. At Baffle, we’ve always held ...

Baffle Earns SINET16 Innovator Award for its Excellence in Data-centric Cyber Security Protection

To say Q3 has been an exciting quarter for Baffle would be an understatement. On the heels of our $20 million fundraising round in August, we were pleased and proud to learn ...

A Message From CEO and Co-founder Ameesh Divatia on Baffle’s Series B Funding

| | General
Since Baffle’s inception in 2015, we’ve strived to look at data protection through a unique lens. That idea is simple: Assume that breaches will happen and ensure unprotected data is never available ...

How To Protect Cloud Data Anywhere Using A Data Security Mesh

It was, literally and figuratively, the perfect storm. A blizzard forced everyone from a Wall Street wealth management firm to work from home. At the same time, clients were denied access to ...
Protecting Cloud Data Throughout Its Lifecycle

Protecting Cloud Data Throughout Its Lifecycle

Organizations have flocked from on-premises to the cloud over the past year, and protecting data during the transition has proven to be a monumental task. But now companies must focus on what ...

Is Tokenization a Good Way to Protect Your Data?

This blog looks at vault-based data tokenization methods and some key challenges on using such approaches in modern compute environments. Data tokenization is a method that transforms a data value to a ...

A Technical Overview of HYOK and RLE with Baffle DPS

As adoption of Hold Your Own Key (HYOK) and Bring Your Own Key (BYOK) continues to increase, we’ve encountered more questions around how our Baffle Data Protection Services (DPS) implementation actually works.  ...
Snowflake demo

De-identifying Data into Snowflake

We recently announced our partnership with Snowflake (you can read more here), and are proud of our unique approach to data de-identification.  This article and video cover how we’ve approached this integration ...

Preserving Retail Data ROI Means Protecting It

The retail industry transformed in many ways in 2020, with online sales representing a clear example of such customer preference shifts. In analyzing these changes, retailers can find a veritable treasure trove ...

New Year Resolutions that every Data Security Team can Love

|
 The incessant implementation of new tools to protect sensitive enterprise data sometimes feels like a high tech arms race between the forces of good and evil.  Renewed focus on some basic ‘blocking ...