Blog

Apple Lets Consumers BYOK; Is Your Cloud Provider Following Suit?

Consumers are used to having their messages encrypted end-to-end so that only those with whom they are communicating can see their messages. But, what about…

Top Business Priorities in 2023: Compliance, Data Security, Data Pipelines and Zero Trust

In today’s ultra-competitive business environment, a company’s ability to distance itself from competitors comes down to data—more specifically, the proficiency with which it can analyze…

AWS Dynamic Data Masking Announcement Solidifies a Commitment to Complete Data Privacy and Security

An exciting and promising aspect of being in the data security industry is seeing the adoption of technology by major players that will help businesses…

Redshift Encryption, Security, and Three Questions that Need Answering

Amazon Redshift is used by tens of thousands of clients to analyze data ranging from terabytes to petabytes and to conduct complicated analytical queries. In…

person typing on keyboard

Protecting Data Is Nonnegotiable Today—Does Your Team Have The Skills To Do It?

Not long ago, the security team was a subset of the IT department. Its main objective was to safeguard the IT infrastructure through perimeter protection,…

Data Protection for Sharing Data Between High and Low Environments

For most IT environments, protecting data as it moves from a high environment (where software or a product is live and customer-facing) to a low…

Privacy-preserving Analytics: The Future of Data Protection Services & Data Security is Now

When Mark Campbell, the chief innovation officer at EVOTEK, asked me to discuss an article he was writing on the quest for mainstream adoption of privacy-preserv…

The Secret to Secure Data? Supporting Your CISO

Few executive positions are as pressure-packed as the chief information security officer (CISO). In one study, 21% of CISOs said their companies offered no support…

Ameesh Divatia appears on theCUBE at AWS re:Inforce to talk about proxy architecture and the future of data security

Baffle CEO Ameesh Divatia talks with John Furrier of theCUBE at the AWS re:Inforce 2022 Security Conference for Amazon Web Services. Since compliance is driving…

AWS s3 Encryption and Data Protection

Having just returned from AWS’s security event, re:Inforce, in Boston, after a three-year hiatus, I was inspired and encouraged by what I learned looking around…