Blog
Preventing PII Leakage through Text Generation AI Systems
Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations…
Data Residency Compliance using Baffle and BYOK
Baffle provides strong encryption and data key management, while also allowing our customers and their tenants to “bring your own key” (BYOK) or “hold your…
Data Masking for PostgreSQL
Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that…
Data sprawl: why application access controls as a security strategy doesn’t work
As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is…
Data Security and Privacy: Your Generative AI Application Doesn’t Need to Know Your Name
A couple of weeks back, I was doing some research on some old mergers and acquisitions in the data security market when I found myself…
Data Security in MySQL is an evolving compliance and threat landscape
MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only…
Baffle Helps Develop IBM’s Groundbreaking Data Security Broker
Baffle powers IBM to deliver data-centric protection with Cloud Security and Compliance Center Data Security Broker
Baffle’s Proxy Architecture
Baffle implements database encryption and role-based access control using a reverse proxy configuration that operates at the SQL session layer. This blog will explore what that means and compare it to competing API and agent-based architectures.
Privacy Enhanced Computation Technologies Advantages and Disadvantages
Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies.
Data Tokenization and Masking with Baffle in Amazon Redshift
Security and compliance for sensitive data in your cloud data pipeline and warehouse while running data analysis.