Baffle Helps Develop IBM’s Groundbreaking Data Security Broker

Baffle powers IBM to deliver data-centric protection with Cloud Security and Compliance Center Data Security Broker The post Baffle Helps Develop IBM’s Groundbreaking Data Security Broker appeared first on Baffle ... Read More
Encryption

Snowflake Data Encryption

There’s no argument that data encryption is a necessary security measure. But when it comes to protecting data on its way to a cloud, is it enough? If you’re using Snowflake to store data, it’s not. That’s because PII data used in a Snowflake table is not anonymized, which means ... Read More

Apple Lets Consumers BYOK; Is Your Cloud Provider Following Suit?

Consumers are used to having their messages encrypted end-to-end so that only those with whom they are communicating can see their messages. But, what about their pictures and documents that are stored in the mobile service provider’s environment? Now, Apple has launched its Advanced Data Protection feature for iCloud’s 850 ... Read More

Top Business Priorities in 2023: Compliance, Data Security, Data Pipelines and Zero Trust

In today’s ultra-competitive business environment, a company’s ability to distance itself from competitors comes down to data—more specifically, the proficiency with which it can analyze raw data and turn it into market-differentiating insight. One could argue that data is the most valuable non-human asset a company possesses. And when something’s ... Read More
AWS re:Invent 2022 - What’s new with Amazon Redshift (ANT201)

AWS Dynamic Data Masking Announcement Solidifies a Commitment to Complete Data Privacy and Security

An exciting and promising aspect of being in the data security industry is seeing the adoption of technology by major players that will help businesses keep their most valuable IT asset—data—safe. Last week, AWS previewed a new solution for dynamic data masking (DDM) for Amazon Redshift. As an AWS partner, ... Read More
Redshift De-identification Demo

Redshift Encryption, Security, and Four Questions that Need Answering

Amazon Redshift is used by tens of thousands of clients to analyze data ranging from terabytes to petabytes and to conduct complicated analytical queries. In addition, Amazon Redshift provides you access to a wide variety of data analytics tools, capabilities for compliance, and even applications for artificial intelligence and machine ... Read More

Protecting Data Is Nonnegotiable Today—Does Your Team Have The Skills To Do It?

Not long ago, the security team was a subset of the IT department. Its main objective was to safeguard the IT infrastructure through perimeter protection, managing password changes and backing up data. But it is not that simple anymore. Organizations are moving a significant amount of their data to the ... Read More

Privacy-preserving Analytics: The Future of Data Security is Now

When Mark Campbell, the chief innovation officer at EVOTEK, asked me to discuss an article he was writing on the quest for mainstream adoption of privacy-preserving analytics, I was thrilled. Privacy-preserving analytics has been a relevant topic for Baffle since 2019 when we were named a Gartner “Cool Vendor.” Three ... Read More

Privacy-preserving Analytics: The Future of Data Security is Now

When Mark Campbell, the chief innovation officer at EVOTEK, asked me to discuss an article he was writing on the quest for mainstream adoption of privacy-preserving analytics, I was thrilled. Privacy-preserving analytics has been a relevant topic for Baffle since 2019 when we were named a Gartner “Cool Vendor.” Three ... Read More

The Secret to Secure Data? Supporting Your CISO

Few executive positions are as pressure-packed as the chief information security officer (CISO). In one study, 21% of CISOs said their companies offered no support to help alleviate the stresses of their job. It is no surprise that the same report found that the average tenure for CISOs was just ... Read More
Loading...

Application Security Check Up