Blog

AWS Dynamic Data Masking Announcement Solidifies a Commitment to Complete Data Protection, Data Privacy, and Security

An exciting and promising aspect of being in the data security industry is seeing the adoption of technology by major players that will help businesses…

Redshift Encryption, Security, and Three Questions that Need Answering

Amazon Redshift is used by tens of thousands of clients to analyze data ranging from terabytes to petabytes and to conduct complicated analytical queries. In…

person typing on keyboard

Protecting Data Is Nonnegotiable Today—Does Your Team Have The Skills To Do It?

Not long ago, the security team was a subset of the IT department. Its main objective was to safeguard the IT infrastructure through perimeter protection,…

Data Protection for Sharing Data Between High and Low Environments

For most IT environments, protecting data as it moves from a high environment (where software or a product is live and customer-facing) to a low…

Privacy-preserving Analytics: The Future of Data Protection Services & Data Security is Now

When Mark Campbell, the chief innovation officer at EVOTEK, asked me to discuss an article he was writing on the quest for mainstream adoption of privacy-preserving…

The Secret to Secure Data? Supporting Your CISO

Few executive positions are as pressure-packed as the chief information security officer (CISO). In one study, 21% of CISOs said their companies offered no support…

Ameesh Divatia appears on theCUBE at AWS re:Inforce to talk about proxy architecture and the future of data security

Baffle CEO Ameesh Divatia talks with John Furrier of theCUBE at the AWS re:Inforce 2022 Security Conference for Amazon Web Services. Since compliance is driving…

AWS s3 Encryption and Data Protection

Having just returned from AWS’s security event, re:Inforce, in Boston, after a three-year hiatus, I was inspired and encouraged by what I learned looking around…

Compliance Budget Survey

As Compliance Requirements Mount, Companies Struggle to Bring Data Security and Privacy Practices up to Speed

The compliance landscape is becoming more complex for U.S. companies, especially those conducting business in multiple states and internationally. In 2022 alone, Connecticut and Utah…

Securing AI Data Pipelines Image

Cloud Security – Securing Cloud AI Data Pipelines

Recent attacks on Jupyter Notebook show threat actors exploit cloud-based data science platforms. And as companies are transitioning from on-premises data centers to private cloud,…