Blog

Data Pipeline Graphic

De-identifying Data into Snowflake

We recently announced our partnership with Snowflake (you can read more here), and are proud of our unique approach to data de-identification and privacy protection.  This article and video…

Business presentation graphic

Preserving Retail Data ROI Means Protecting It

The retail industry transformed in many ways in 2020, with online sales representing a clear example of such customer preference shifts. In analyzing these changes,…

secure

NextGen DLP: Data Misuse Protection

Data loss prevention is a fundamental security principle within the IT industry. The term DLP has been used for over two decades to refer to the…

New year resolutions that every data security team can love

New Year Resolutions that every Data Security Team can Love

 The incessant implementation of new tools to protect sensitive enterprise data sometimes feels like a high tech arms race between the forces of good and…

Looking ahead to Data privacy in 2021

Looking Ahead to Data Privacy in 2021

The adage asserts that hindsight is 20/20, and the events of the last year seem to have supported that claim, especially as it relates to…

Baffle x AWS

Tokenize and de-identify data in AWS RDS in less than 10 minutes

Follow this link to read the Amazon Partner Network (APN) Blog. When it comes to security implementations, the amount of friction or overhead generated by…

Adaptive Data Security

Adaptive data security controls to reduce the risk of data breaches

2020 is the year that just keeps on giving.  We’ve written a fair amount about how to assess the threat model for your data and…

an unprotected analysis pipeline undermines the value of data

An Unprotected Data Analytics Pipeline Undermines The Value Of Data

Some estimate that 90% of the world’s data has been produced in the past two years alone. This proverbial tidal wave of information positions businesses…

getting your data protocols CPRA-ready

Getting Your Data Protocols CPRA-ready

Amidst the frenetic activity still going on with the presidential election, this week California passed Proposition 24, an important bill which will strengthen digital privacy…

data breaches 2

Critical Gaps in the Data Access Threat Model

This blog, the third in a series on “Why you can’t stop data breaches”, details various attack methods used to compromise a set of common…