RBAC tickets

Why RBAC for Data Reigns Supreme in the Age of Cloud Threats

Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant cracks against modern threats. This is where ...
ZTNA, migrating, backup data, zero-trust, security, zero-trust, business, policy container zero-trust ZTNA

Four Steps to Integrate Zero-Trust

So, how do you know who to trust in your company when it comes to protecting your most sensitive data? The answer: No one ...
Security Boulevard

FBI Alert: Dual Ransomware Attack Surge

In recent times, cybersecurity threats and dual ransomware incidents have evolved, affecting organizations worldwide. The Federal Bureau of Investigation (FBI) has issued a warning about a troubling trend pertaining to dual ransomware ...
Data sprawl: why application access controls as a security strategy doesn’t work

Data sprawl: why application access controls as a security strategy doesn’t work

As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is fantastic for individuals who want to keep ...

Data Security in MySQL is an evolving compliance and threat landscape

MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only for those who purchase and use the ...

Data Security in MySQL is an evolving compliance and threat landscape

MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only for those who purchase and use the ...

Baffle Helps Develop IBM’s Groundbreaking Data Security Broker

Baffle powers IBM to deliver data-centric protection with Cloud Security and Compliance Center Data Security Broker The post Baffle Helps Develop IBM’s Groundbreaking Data Security Broker appeared first on Baffle ...
Privacy Enhanced Technologies

Privacy Enhanced Computation Technologies Advantages and Disadvantages

Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies. The post Privacy Enhanced Computation Technologies Advantages and Disadvantages appeared first ...

Announcing Baffle Advanced Encryption

Baffle Advanced Encryption is the easiest fastest, and most flexible way to analyze your regulated data while meeting compliance requirements The post Announcing Baffle Advanced Encryption appeared first on Baffle ...

Advantages and Disadvantages of Homomorphic Encryption 2023

Four years after our first blog on homomorphic encryption, we revisit the technology to see what's changed to make it viable for enterprises. The short answer: not much. The post Advantages and ...