Blog
Category: Privacy
Advantages and Disadvantages of Homomorphic Encryption 2023
Four years after our first blog on homomorphic encryption, we revisit the technology to see what’s changed to make it viable for enterprises. The short answer: not much.
Is data masking the same as data encryption?
Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always…
Enterprise considerations for implementing data encryption
Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to…
Transparent Data Encryption is Not Enough
Security for an earlier time One of the biggest challenges with security is understanding the threats and how to properly defend against them. Just because…
Data Encryption Methods and their Advantages and Disadvantages
Protecting data has become a critical part of every organization’s operation. However, choosing the best method of data encryption can be difficult with all the…
Multi-Tenant Data Security for Databases with Record-Level Encryption
Multi-tenant databases are commonly used by SaaS vendors for the sake of cost-efficiency. Having a separate database instance for each of their customers, while ensuring…
Apple Lets Consumers BYOK; Is Your Cloud Provider Following Suit?
Consumers are used to having their messages encrypted end-to-end so that only those with whom they are communicating can see their messages. But, what about…
How to De-Identify Your Data in IBM Cloud with Baffle Data Protection Services
IBM Cloud offers an extensive portfolio of cloud-native databases that IBM provides as secure, production ready, and fully managed database technologies, to enable developers to…
Protecting Your Data in Your Cloud with the Baffle Data Privacy Cloud
As organizations continue to build out their cloud-based data lakes and analytics environments, there’s a huge push to implement data privacy and de-identification methods for…
Is Tokenization a Good Way to Protect Your Data?
This blog looks at the functionality of vault-based data tokenization methods and some key data protection challenges in using such approaches in cloud security and modern compute…