Blog

Category: Privacy

Preventing PII Leakage through Text Generation AI Systems

Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations…

Data Security and Privacy: Your Generative AI Application Doesn’t Need to Know Your Name

A couple of weeks back, I was doing some research on some old mergers and acquisitions in the data security market when I found myself…

Red and blue padlock icons with binary text

Advantages and Disadvantages of Homomorphic Encryption 2023

Four years after our first blog on homomorphic encryption, we revisit the technology to see what’s changed to make it viable for enterprises. The short answer: not much.

Is data masking the same as data encryption?

Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always…

Data Encryption Checklist for Enterprises

Enterprise considerations for implementing data encryption

Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to…

Scrabble TDE

Transparent Data Encryption is Not Enough

Security for an earlier time One of the biggest challenges with security is understanding the threats and how to properly defend against them. Just because…

Encrypted keys

Data Encryption Methods and their Advantages and Disadvantages

Protecting data has become a critical part of every organization’s operation. However, choosing the best method of data encryption can be difficult with all the…

Multi-Tenant Data Security for Databases with Record-Level Encryption

Multi-tenant databases are commonly used by SaaS vendors for the sake of cost-efficiency.  Having a separate database instance for each of their customers, while ensuring…

Apple Lets Consumers BYOK; Is Your Cloud Provider Following Suit?

Consumers are used to having their messages encrypted end-to-end so that only those with whom they are communicating can see their messages. But, what about…

Baffle x IBM Cloud

How to De-Identify Your Data in IBM Cloud with Baffle Data Protection Services

IBM Cloud offers an extensive portfolio of cloud-native databases that IBM provides as secure, production ready, and fully managed database technologies, to enable developers to…