Data encryption
Advantages and Disadvantages of Homomorphic Encryption 2023
Four years after our first blog on homomorphic encryption, we revisit the technology to see what's changed to make it viable for enterprises. The short answer: not much. The post Advantages and ...
Is data masking the same as data encryption?
Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always mutually exclusive, there are some key differences ...
Launch of Baffle Manager v2
Baffle is constantly striving to be the easiest way to protect sensitive data. We do this with a data-centric approach that protects data as it is created, used, and shared across the ...
Enterprise considerations for implementing data encryption
Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to data encryption and enterprises must consider several ...
Data Encryption Methods and their Advantages and Disadvantages
Protecting data has become a critical part of every organization’s operation. However, choosing the best method of data encryption can be difficult with all the available options. Here we discuss the ...
How Health Care Data Encryption Fits Into Your Security Strategy
Hospitals, government health agencies and other health care entities have a growing need to securely store and transfer personal data, both from patient to provider and with relevant agencies, insurers and regulators ...
Cloud Security Basics for Small Business
Storing your company data in the cloud is so convenient. It’s easy for everyone to access, and you don’t have to run servers. But it comes with cybersecurity risks, too. Cloud providers ...
China’s MY2022 App Could Do More Than Trace COVID-19 Exposure
Researchers at The Citizen Lab at the University of Toronto dug into the MY2022 COVID-19 exposure tracing application mandated for use by attendees and participants in the Beijing Winter Olympic Games—and what ...
Best Practices for Improving Cloud Encryption
As businesses increasingly adopt cloud technology, cloud security becomes paramount. Every year, the number of cloud security threats increases, making organizations reconsider their decision to migrate from on-premises and investigate ways to ...
How to Make Working With Personal Data Less Risky
When assessing risk in your organization, the first step is to define the scope of your information assets, especially those which could impact the confidentiality, integrity and accessibility of information within your ...