Data encryption
Privacy Enhanced Computation Technologies Advantages and Disadvantages
Laura Case, Director of Product Management | | analytics, Data encryption, Privacy Enhanced Computation, privacy regulations, sensitive data
Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies. The post Privacy Enhanced Computation Technologies Advantages and Disadvantages appeared first ...
Announcing Baffle Advanced Encryption
Laura Case, Director of Product Management | | analytics, Data encryption, privacy regulations, sensitive data
Baffle Advanced Encryption is the easiest fastest, and most flexible way to analyze your regulated data while meeting compliance requirements The post Announcing Baffle Advanced Encryption appeared first on Baffle ...
Advantages and Disadvantages of Homomorphic Encryption 2023
Four years after our first blog on homomorphic encryption, we revisit the technology to see what's changed to make it viable for enterprises. The short answer: not much. The post Advantages and ...
Is data masking the same as data encryption?
Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always mutually exclusive, there are some key differences ...
Launch of Baffle Manager v2
Billy VanCannon, Director of Product Management | | byok, Cloud, Data encryption, Data Masking Techniques, Tokenization
Baffle is constantly striving to be the easiest way to protect sensitive data. We do this with a data-centric approach that protects data as it is created, used, and shared across the ...
Enterprise considerations for implementing data encryption
Sushant Rao, SVP of Marketing | | byok, CCPA, Cloud, Data encryption, Data Masking Techniques, dynamic data masking, GDPR, Privacy, sensitive data, Tokenization
Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to data encryption and enterprises must consider several ...
Data Encryption Methods and their Advantages and Disadvantages
Protecting data has become a critical part of every organization’s operation. However, choosing the best method of data encryption can be difficult with all the available options. Here we discuss the ...
How Health Care Data Encryption Fits Into Your Security Strategy
Richard Kanadjian | | Data encryption, Data Security, hardware encrypted device, health data, HIPPA, protected health information
Hospitals, government health agencies and other health care entities have a growing need to securely store and transfer personal data, both from patient to provider and with relevant agencies, insurers and regulators ...
Security Boulevard
Cloud Security Basics for Small Business
Storing your company data in the cloud is so convenient. It’s easy for everyone to access, and you don’t have to run servers. But it comes with cybersecurity risks, too. Cloud providers ...
China’s MY2022 App Could Do More Than Trace COVID-19 Exposure
Christopher Burgess | | china, Data encryption, Data Privacy, Data Security, mobile app security, MY2022, olympics
Researchers at The Citizen Lab at the University of Toronto dug into the MY2022 COVID-19 exposure tracing application mandated for use by attendees and participants in the Beijing Winter Olympic Games—and what ...
Security Boulevard