Blog
Privacy Enhanced Computation Technologies Advantages and Disadvantages
Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies.
Data Tokenization and Masking with Baffle in Amazon Redshift
Security and compliance for sensitive data in your cloud data pipeline and warehouse while running data analysis.
Announcing Baffle Advanced Encryption
Baffle Advanced Encryption is the easiest fastest, and most flexible way to analyze your regulated data while meeting compliance requirements
The Updated EU-US Data Privacy Framework: Enhancing Trans-Atlantic Data Privacy
The new Trans-Atlantic Data Privacy Framework will bring about an unprecedented change in how data privacy is regulated and safeguarded. In this post we discuss its significance and how Baffle Data Protection addresses its key aspects.
Advantages and Disadvantages of Homomorphic Encryption 2023
Four years after our first blog on homomorphic encryption, we revisit the technology to see what’s changed to make it viable for enterprises. The short answer: not much.
Is data masking the same as data encryption?
Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always…
A look into the file-transfer attack (and how to protect your data)
A discussion of recent Fortra, Accellion, and Progress Software file transfer attacks and the security measures that could be used to prevent them.
Launch of Baffle Manager v2
Baffle is constantly striving to be the easiest way to protect sensitive data. We do this with a data-centric approach that protects data as it…
Enterprise considerations for implementing data encryption
Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to…
Static Data Masking versus Dynamic Data Masking
Wondering which type of masking is best for your data? In this blog post, we discuss the differences and which use cases best suit each type of masking.