Blog
Category: Cloud
Ameesh Divatia talks with CyberNews about the most efficient ways enterprises can protect sensitive data in the cloud
Large-scale businesses, healthcare sectors, and government institutions are often primary targets of cyberattacks due to the extensive amounts of sensitive data they possess. Hackers turn…
Protecting Your Data in Your Cloud with the Baffle Data Privacy Cloud
As organizations continue to build out their cloud-based data lakes and analytics environments, there’s a huge push to implement data privacy and de-identification methods for…
A Technical Overview of HYOK and RLE with Baffle DPS
As adoption of Hold Your Own Key (HYOK) and Bring Your Own Key (BYOK) continues to increase, we’ve encountered more questions around how our Baffle…
Delivering HYOK for Financial Services with IBM Cloud
Today, IBM announced IBM Cloud for Financial Services, the first financial services ready cloud platform. The announcement also highlights an ecosystem of over 90 technology…
De-identifying Data into Snowflake
We recently announced our partnership with Snowflake (you can read more here), and are proud of our unique approach to data de-identification and privacy protection. This article and video…
Tokenize and de-identify data in AWS RDS in less than 10 minutes
Follow this link to read the Amazon Partner Network (APN) Blog. When it comes to security implementations, the amount of friction or overhead generated by…
An Unprotected Data Analytics Pipeline Undermines The Value Of Data
Some estimate that 90% of the world’s data has been produced in the past two years alone. This proverbial tidal wave of information positions businesses…
Critical Gaps in the Data Access Threat Model
This blog, the third in a series on “Why you can’t stop data breaches”, details various attack methods used to compromise a set of common…
Risk Acceptance and Security Trade-offs: Managing Performance vs. Security
I recently read a note by someone discussing the futility of having engineers focus on performance cycles in order to optimize data encryption operations, and…