A Case Study for Protecting Files with Sensitive Data in the Cloud

A Case Study for Protecting Files with Sensitive Data in the Cloud

Financial institutions and healthcare providers deal with a vast amount of sensitive data like PII and PHI data, from Social Security numbers (SSN) to credit card information and medical records. Often, this data resides in various file formats like Excel, CSV, and others, stored on-premises or in cloud object storage ... Read More
RBAC tickets

Why RBAC for Data Reigns Supreme in the Age of Cloud Threats

Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant cracks against modern threats. This is where Role-Based Access Control (RBAC) for databases steps in, becoming a crucial line of defense for safeguarding your data ... Read More

Data Masking for PostgreSQL

Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous data. For PostgreSQL, there are a couple of options for masking data. This blog post delves into the ... Read More

Data Masking for PostgreSQL

Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous data. For PostgreSQL, there are a couple of options for masking data. This blog post delves into the ... Read More
Is data masking the same as data encryption?

Is data masking the same as data encryption?

Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always mutually exclusive, there are some key differences between the two techniques.  What is Data Masking? Data masking is a process of replacing sensitive data with ... Read More
Enterprise considerations for implementing data encryption

Enterprise considerations for implementing data encryption

Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to data encryption and enterprises must consider several factors before choosing the right tools and architecture for their needs. In this blog post, we will explore ... Read More
Multi-Tenant Data Security for Databases with Record-Level Encryption

Multi-Tenant Data Security for Databases with Record-Level Encryption

Multi-tenant databases are commonly used by SaaS vendors for the sake of cost-efficiency.  Having a separate database instance for each of their customers, while ensuring each customer’s data is isolated, is prohibitively expensive.  So, having a database instance with multiple customers’ information in it is the way to go from ... Read More

Application Security Check Up