Blog

Category: Privacy

Baffle x IBM Cloud

How to De-Identify Your Data in IBM Cloud with Baffle Data Protection Services

IBM Cloud offers an extensive portfolio of cloud-native databases that IBM provides as secure, production ready, and fully managed database technologies, to enable developers to…

Protecting Your Data in Your Cloud with the Baffle Data Privacy Cloud

As organizations continue to build out their cloud-based data lakes and analytics environments, there’s a huge push to implement data privacy and de-identification methods for…

tokenization

Is Tokenization a Good Way to Protect Your Data?

This blog looks at the functionality of vault-based data tokenization methods and some key data protection challenges in using such approaches in cloud security and modern compute…

Encrypted keys

A Technical Overview of HYOK and RLE with Baffle DPS

As adoption of Hold Your Own Key (HYOK) and Bring Your Own Key (BYOK) continues to increase, we’ve encountered more questions around how our Baffle…

Data Pipeline Graphic

De-identifying Data into Snowflake

We recently announced our partnership with Snowflake (you can read more here), and are proud of our unique approach to data de-identification and privacy protection.  This article and video…

Looking ahead to Data privacy in 2021

Looking Ahead to Data Privacy in 2021

The adage asserts that hindsight is 20/20, and the events of the last year seem to have supported that claim, especially as it relates to…

Baffle x AWS

Tokenize and de-identify data in AWS RDS in less than 10 minutes

Follow this link to read the Amazon Partner Network (APN) Blog. When it comes to security implementations, the amount of friction or overhead generated by…

speed

Risk Acceptance and Security Trade-offs: Managing Performance vs. Security

I recently read a note by someone discussing the futility of having engineers focus on performance cycles in order to optimize data encryption operations, and…

combining data utilization and privacy

Combining CCPA Compliant Data Utilization and Privacy

Today marks the first day the attorney general will enforce the CCPA or California Consumer Privacy Act, a milestone day for all of us, who,…

are gdpr and other privacy regulations enough

Are GDPR and Other Privacy Regulations Enough?

Two years ago, the General Data Protection Regulation (GDPR) was introduced and hailed as the most significant change in data privacy regulation in two decades….