Blog

Category: Data Encryption

RBAC tickets

Why RBAC for Data Reigns Supreme in the Age of Cloud Threats

Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant…

Data sprawl: why application access controls as a security strategy doesn’t work

As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is…

Data Security in MySQL is an evolving compliance and threat landscape

MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only…

Baffle Helps Develop IBM’s Groundbreaking Data Security Broker

Baffle powers IBM to deliver data-centric protection with Cloud Security and Compliance Center Data Security Broker

Laptop icon with shield and padlock

Privacy Enhanced Computation Technologies Advantages and Disadvantages

Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies.

Announcing Baffle Advanced Encryption

Baffle Advanced Encryption is the easiest fastest, and most flexible way to analyze your regulated data while meeting compliance requirements

Red and blue padlock icons with binary text

Advantages and Disadvantages of Homomorphic Encryption 2023

Four years after our first blog on homomorphic encryption, we revisit the technology to see what’s changed to make it viable for enterprises. The short answer: not much.

Is data masking the same as data encryption?

Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always…

Baffle Manager

Launch of Baffle Manager v2

Baffle is constantly striving to be the easiest way to protect sensitive data.  We do this with a data-centric approach that protects data as it…

Data Encryption Checklist for Enterprises

Enterprise considerations for implementing data encryption

Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to…