Blog

Category: Cloud

Encrypted keys

A Technical Overview of HYOK and RLE with Baffle DPS

As adoption of Hold Your Own Key (HYOK) and Bring Your Own Key (BYOK) continues to increase, we’ve encountered more questions around how our Baffle…

Baffle x IBM Cloud

Delivering HYOK for Financial Services with IBM Cloud

Today, IBM announced IBM Cloud for Financial Services, the first financial services ready cloud platform.  The announcement also highlights an ecosystem of over 90 technology…

Data Pipeline Graphic

De-identifying Data into Snowflake

We recently announced our partnership with Snowflake (you can read more here), and are proud of our unique approach to data de-identification.  This article and…

Baffle x AWS

Tokenize and de-identify data in AWS RDS in less than 10 minutes

Follow this link to read the Amazon Partner Network (APN) Blog. When it comes to security implementations, the amount of friction or overhead generated by…

an unprotected analysis pipeline undermines the value of data

An Unprotected Data Analytics Pipeline Undermines The Value Of Data

Some estimate that 90% of the world’s data has been produced in the past two years alone. This proverbial tidal wave of information positions businesses…

data breaches 2

Critical Gaps in the Data Access Threat Model

This blog, the third in a series on “Why you can’t stop data breaches”, details various attack methods used to compromise a set of common…

speed

Risk Acceptance and Security Trade-offs: Managing Performance vs. Security

I recently read a note by someone discussing the futility of having engineers focus on performance cycles in order to optimize data encryption operations, and…

A DataSecOps approach to cloud migration is not negotiable

A DataSecOps Approach to Cloud Migration Is Not Negotiable

A recent study of CIOs offered good news for those concerned about cloud data protection. It reported that 86% of respondents are now viewing security…

cloud misconfigurations

Cloud misconfigurations: a surging, but overlooked threat to cloud data security

Enterprises continue to migrate their workloads to the cloud with the promise of lower costs, increased agility and greater flexibility. But cloud migration also brings…