The Updated EU-US Data Privacy Framework: Enhancing Trans-Atlantic Data Privacy
The new Trans-Atlantic Data Privacy Framework will bring about an unprecedented change in how data privacy is regulated and safeguarded. In this post we discuss its significance and how Baffle Data Protection ...
Advantages and Disadvantages of Homomorphic Encryption 2023
Four years after our first blog on homomorphic encryption, we revisit the technology to see what's changed to make it viable for enterprises. The short answer: not much. The post Advantages and ...
Is data masking the same as data encryption?
Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always mutually exclusive, there are some key differences ...
A look into the file-transfer attack (and how to protect your data)
Billy VanCannon, Director of Product Management | | Accellion, CL0P, clop, File Transfer Hack, File Transfer Security, GoAnywhere, MOVEit
A discussion of recent Fortra, Accellion, and Progress Software file transfer attacks and the security measures that could be used to prevent them. The post A look into the file-transfer attack (and ...
Launch of Baffle Manager v2
Billy VanCannon, Director of Product Management | | byok, Cloud, Data encryption, Data Masking Techniques, Tokenization
Baffle is constantly striving to be the easiest way to protect sensitive data. We do this with a data-centric approach that protects data as it is created, used, and shared across the ...
Enterprise considerations for implementing data encryption
Sushant Rao, SVP of Marketing | | byok, CCPA, Cloud, Data encryption, Data Masking Techniques, dynamic data masking, GDPR, Privacy, sensitive data, Tokenization
Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to data encryption and enterprises must consider several ...
Static Data Masking versus Dynamic Data Masking
Laura Case, Director of Product Management | | Data Masking Techniques, dynamic data masking, sensitive data, static data masking
Wondering which type of masking is best for your data? In this blog post, we discuss the differences and which use cases best suit each type of masking. The post Static Data ...
Transparent Data Encryption is Not Enough
Security for an earlier time One of the biggest challenges with security is understanding the threats and how to properly defend against them. Just because the data is encrypted “at-rest” and you ...
Data Encryption Methods and their Advantages and Disadvantages
Protecting data has become a critical part of every organization’s operation. However, choosing the best method of data encryption can be difficult with all the available options. Here we discuss the ...
Basics of Data Masking
Laura Case, Director of Product Management | | Data Masking Techniques, dynamic data masking, sensitive data, static data masking
Asking different people within software organizations or even different people within the security space to define “data masking” often means you will get different – and sometimes complex – answers. There are ...