Does Real Queryable Encryption mean there is a Fake Queryable Encryption?
Billy VanCannon, Director of Product Management | | analytics, databases, encryption, mysql, PostgreSQL, Privacy Enhanced Computation, Real Queryable Encryption
TLDR There is no “fake” queryable encryption, but a certain NoSQL database provider has coined the term “Queryable Encryption”, and Baffle has something to say about that. Background To understand real queryable ...
A Case Study for Protecting Files with Sensitive Data in the Cloud
Financial institutions and healthcare providers deal with a vast amount of sensitive data like PII and PHI data, from Social Security numbers (SSN) to credit card information and medical records. Often, this ...
Why RBAC for Data Reigns Supreme in the Age of Cloud Threats
Sushant Rao, SVP of Marketing | | Data encryption, Data Security, privacy regulations, sensitive data
Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant cracks against modern threats. This is where ...
Preventing PII Leakage through Text Generation AI Systems
Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations on how one can trick them into ...
Data Residency Compliance using Baffle and BYOK
Billy VanCannon, Director of Product Management | | byok, Data Residency, data sovereignty, encryption, GDPR, HYOK, Multi-Tenant Key, SaaS
Baffle provides strong encryption and data key management, while also allowing our customers and their tenants to “bring your own key” (BYOK) or “hold your own key” (HYOK) for maximum control over ...
Data Residency Compliance using Baffle and BYOK
Billy VanCannon, Director of Product Management | | byok, Data Residency, data sovereignty, encryption, GDPR, HYOK, Multi-Tenant Key, SaaS
Baffle provides strong encryption and data key management, while also allowing our customers and their tenants to “bring your own key” (BYOK) or “hold your own key” (HYOK) for maximum control over ...
Data Masking for PostgreSQL
Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous ...
Data Masking for PostgreSQL
Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous ...
Data sprawl: why application access controls as a security strategy doesn’t work
Laura Case, Director of Product Management | | Data encryption, Data Security, privacy regulations, sensitive data
As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is fantastic for individuals who want to keep ...
Data Security and Privacy: Your Generative AI Application Doesn’t Need to Know Your Name
A couple of weeks back, I was doing some research on some old mergers and acquisitions in the data security market when I found myself drawing a blank on the name of ...