May 12th, 2020

Why Information Sharing and Accelerating Response Times Are Critical During a Crisis

In October 2019, the Center for Strategic and International Studies (CSIS) ran three simulated scenarios to map how nations, organizations and economies would respond in the face of a global crisis. The three scenarios were: a nation-state cyberattack and a disinformation campaign against the U.S.;…

Read More

In October 2019, the Center for Strategic and International Studies (CSIS) ran three simulated scenarios to map how nations, organizations and economies would respond in the face of a global crisis. The three scenarios were: a nation-state cyberattack and a disinformation campaign against the U.S.;…

Read More

April 24th, 2020

Why you can’t stop data breaches – Part I

Over the past decade plus, we’ve seen a continued onslaught of data breaches that shows no signs of slowing down. And as we talk with prospects, we continue to get the the same questions over and over again. – How are you different than database…

Read More

Over the past decade plus, we’ve seen a continued onslaught of data breaches that shows no signs of slowing down. And as we talk with prospects, we continue to get the the same questions over and over again. – How are you different than database…

Read More

April 17th, 2020

Secure data analytics and info sharing for healthcare

Obviously, there’s a lot of focus on the healthcare industry these days and rightly so. We’ve been working with several organizations recently with our secure data sharing platform to facilitate privacy preserving analytics on data across multiple organizations and third parties. The technique enables anonymization…

Read More

Obviously, there’s a lot of focus on the healthcare industry these days and rightly so. We’ve been working with several organizations recently with our secure data sharing platform to facilitate privacy preserving analytics on data across multiple organizations and third parties. The technique enables anonymization…

Read More

April 2nd, 2020

Information sharing and accelerating response times in the face of crises

In October 2019, the Center for Strategic and International Studies (CSIS) ran three simulated scenarios to map how nations, organizations and economies would respond in the face of a global crisis. The three scenarios were a nation state cyber attack and disinformation campaign against the…

Read More

In October 2019, the Center for Strategic and International Studies (CSIS) ran three simulated scenarios to map how nations, organizations and economies would respond in the face of a global crisis. The three scenarios were a nation state cyber attack and disinformation campaign against the…

Read More

February 11th, 2020

Using SMPC for Threat Intel Sharing

As privacy continues to rise in importance as a critical mandate for how businesses operate, cryptographic techniques such as homomorphic encryption and secure multi-party compute (SMPC) have received a lot more recognition.While there are similarities in terms of some of the capabilities that the two…

Read More

As privacy continues to rise in importance as a critical mandate for how businesses operate, cryptographic techniques such as homomorphic encryption and secure multi-party compute (SMPC) have received a lot more recognition.While there are similarities in terms of some of the capabilities that the two…

Read More

November 4th, 2019

Simplified Data Masking. Simplified Compliance.

Last week, we announced a new offering in our product portfolio — simplified data masking and exfiltration control. The solution provides organizations with an end-to-end data control mechanism that restricts views of the data at the application tier, while also supporting encryption at the field…

Read More

Last week, we announced a new offering in our product portfolio — simplified data masking and exfiltration control. The solution provides organizations with an end-to-end data control mechanism that restricts views of the data at the application tier, while also supporting encryption at the field…

Read More

October 29th, 2019

Baffle Unveils Data Masking and Exfiltration Control to Mitigate Data Breach Risks

New Solution Masks and Protects Data on the Fly with No Application Changes; Enables Businesses to Securely Share Data with Third Parties SANTA CLARA, Calif. — October 29, 2019 — Baffle Inc., an advanced data protection company, today released Baffle Data Masking and Exfiltration Control,…

Read More

New Solution Masks and Protects Data on the Fly with No Application Changes; Enables Businesses to Securely Share Data with Third Parties SANTA CLARA, Calif. — October 29, 2019 — Baffle Inc., an advanced data protection company, today released Baffle Data Masking and Exfiltration Control,…

Read More

October 21st, 2019

Jail Time for Data Breaches?

We were at lunch with a customer the other day and started talking about various privacy initiatives and upcoming regulations such as the California Consumer Privacy Act (CCPA) and some of the impacts of GDPR. The conversation turned to a lesser known data privacy regulation,…

Read More

We were at lunch with a customer the other day and started talking about various privacy initiatives and upcoming regulations such as the California Consumer Privacy Act (CCPA) and some of the impacts of GDPR. The conversation turned to a lesser known data privacy regulation,…

Read More