Data sprawl: why application access controls as a security strategy doesn’t work

Data sprawl: why application access controls as a security strategy doesn’t work

As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is fantastic for individuals who want to keep their data secure, but this places a burden on enterprises to know where data is stored and whether ... Read More
Privacy Enhanced Technologies

Privacy Enhanced Computation Technologies Advantages and Disadvantages

Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies. The post Privacy Enhanced Computation Technologies Advantages and Disadvantages appeared first on Baffle ... Read More

Announcing Baffle Advanced Encryption

Baffle Advanced Encryption is the easiest fastest, and most flexible way to analyze your regulated data while meeting compliance requirements The post Announcing Baffle Advanced Encryption appeared first on Baffle ... Read More

Advantages and Disadvantages of Homomorphic Encryption 2023

Four years after our first blog on homomorphic encryption, we revisit the technology to see what's changed to make it viable for enterprises. The short answer: not much. The post Advantages and Disadvantages of Homomorphic Encryption 2023 appeared first on Baffle ... Read More
Data Masking

Static Data Masking versus Dynamic Data Masking

Wondering which type of masking is best for your data? In this blog post, we discuss the differences and which use cases best suit each type of masking. The post Static Data Masking versus Dynamic Data Masking appeared first on Baffle ... Read More
Database Icon with Data Masking

Basics of Data Masking

Asking different people within software organizations or even different people within the security space to define “data masking” often means you will get different – and sometimes complex – answers. There are so many terms, pseudonyms, and technologies related to data masking that we wanted to get back to the ... Read More

Application Security Check Up