Blog

Category: Privacy

Introducing Fine-Grained Data Security for Amazon S3

Amazon S3 (Simple Storage Service) is a cornerstone of the AWS ecosystem, providing a highly scalable, durable, and cost-effective object storage solution. It serves as…

RBAC tickets

Why RBAC for Data Reigns Supreme in the Age of Cloud Threats

Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant…

Preventing PII Leakage through Text Generation AI Systems

Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations…

PostgreSQL relational database management system logo displayed on laptop computer screen

Data Masking for PostgreSQL

Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that…

Data sprawl: why application access controls as a security strategy doesn’t work

As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is…

Data Security and Privacy: Your Generative AI Application Doesn’t Need to Know Your Name

A couple of weeks back, I was doing some research on some old mergers and acquisitions in the data security market when I found myself…

Data Security in MySQL is an evolving compliance and threat landscape

MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only…

Baffle Helps Develop IBM’s Groundbreaking Data Security Broker

Baffle powers IBM to deliver data-centric protection with Cloud Security and Compliance Center Data Security Broker

Laptop icon with shield and padlock

Privacy Enhanced Computation Technologies Advantages and Disadvantages

Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies.