Advantages and Disadvantages of Homomorphic Encryption 2023

Four years after our first blog on homomorphic encryption, we revisit the technology to see what's changed to make it viable for enterprises. The short answer: not much. The post Advantages and ...
Is data masking the same as data encryption?

Is data masking the same as data encryption?

Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always mutually exclusive, there are some key differences ...

Launch of Baffle Manager v2

Baffle is constantly striving to be the easiest way to protect sensitive data.  We do this with a data-centric approach that protects data as it is created, used, and shared across the ...
Enterprise considerations for implementing data encryption

Enterprise considerations for implementing data encryption

Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to data encryption and enterprises must consider several ...
Encrypted keys

Data Encryption Methods and their Advantages and Disadvantages

Protecting data has become a critical part of every organization’s operation. However, choosing the best method of data encryption can be difficult with all the available options.   Here we discuss the ...
health care, data, cloud, quantum, medical device healthcare encryption zero-trust health care CISO Talk - Healthcare and Cyber - cybersecurity - cyber threats - cyberattack

How Health Care Data Encryption Fits Into Your Security Strategy

Hospitals, government health agencies and other health care entities have a growing need to securely store and transfer personal data, both from patient to provider and with relevant agencies, insurers and regulators ...
Security Boulevard
Cloud Security Basics for Small Business

Cloud Security Basics for Small Business

Storing your company data in the cloud is so convenient. It’s easy for everyone to access, and you don’t have to run servers. But it comes with cybersecurity risks, too. Cloud providers ...
mobile workforce Salesforce supply chain MY2022 JumpCloud Confronting Mobile Security Issues

China’s MY2022 App Could Do More Than Trace COVID-19 Exposure

Researchers at The Citizen Lab at the University of Toronto dug into the MY2022 COVID-19 exposure tracing application mandated for use by attendees and participants in the Beijing Winter Olympic Games—and what ...
Security Boulevard
encryption enterprise encryption

Best Practices for Improving Cloud Encryption 

As businesses increasingly adopt cloud technology, cloud security becomes paramount. Every year, the number of cloud security threats increases, making organizations reconsider their decision to migrate from on-premises and investigate ways to ...
Security Boulevard
Barracuda Dell data center risk fintech ransomware zero-trust data security

How to Make Working With Personal Data Less Risky

When assessing risk in your organization, the first step is to define the scope of your information assets, especially those which could impact the confidentiality, integrity and accessibility of information within your ...
Security Boulevard