A Case Study for Protecting Files with Sensitive Data in the Cloud
Financial institutions and healthcare providers deal with a vast amount of sensitive data like PII and PHI data, from Social Security numbers (SSN) to credit card information and medical records. Often, this data resides in various file formats like Excel, CSV, and others, stored on-premises or in cloud object storage ... Read More
Why RBAC for Data Reigns Supreme in the Age of Cloud Threats
Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant cracks against modern threats. This is where Role-Based Access Control (RBAC) for databases steps in, becoming a crucial line of defense for safeguarding your data ... Read More
Data Masking for PostgreSQL
Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous data. For PostgreSQL, there are a couple of options for masking data. This blog post delves into the ... Read More
Data Masking for PostgreSQL
Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous data. For PostgreSQL, there are a couple of options for masking data. This blog post delves into the ... Read More
Is data masking the same as data encryption?
Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always mutually exclusive, there are some key differences between the two techniques. What is Data Masking? Data masking is a process of replacing sensitive data with ... Read More
Enterprise considerations for implementing data encryption
Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to data encryption and enterprises must consider several factors before choosing the right tools and architecture for their needs. In this blog post, we will explore ... Read More
Multi-Tenant Data Security for Databases with Record-Level Encryption
Multi-tenant databases are commonly used by SaaS vendors for the sake of cost-efficiency. Having a separate database instance for each of their customers, while ensuring each customer’s data is isolated, is prohibitively expensive. So, having a database instance with multiple customers’ information in it is the way to go from ... Read More