Blog
AWS Dynamic Data Masking Announcement Solidifies a Commitment to Complete Data Protection, Data Privacy, and Security
An exciting and promising aspect of being in the data security industry is seeing the adoption of technology by major players that will help businesses…
Redshift Encryption, Security, and Three Questions that Need Answering
Amazon Redshift is used by tens of thousands of clients to analyze data ranging from terabytes to petabytes and to conduct complicated analytical queries. In…
Protecting Data Is Nonnegotiable Today—Does Your Team Have The Skills To Do It?
Not long ago, the security team was a subset of the IT department. Its main objective was to safeguard the IT infrastructure through perimeter protection,…
Data Protection for Sharing Data Between High and Low Environments
For most IT environments, protecting data as it moves from a high environment (where software or a product is live and customer-facing) to a low…
Privacy-preserving Analytics: The Future of Data Protection Services & Data Security is Now
When Mark Campbell, the chief innovation officer at EVOTEK, asked me to discuss an article he was writing on the quest for mainstream adoption of privacy-preserving…
The Secret to Secure Data? Supporting Your CISO
Few executive positions are as pressure-packed as the chief information security officer (CISO). In one study, 21% of CISOs said their companies offered no support…
Ameesh Divatia appears on theCUBE at AWS re:Inforce to talk about proxy architecture and the future of data security
Baffle CEO Ameesh Divatia talks with John Furrier of theCUBE at the AWS re:Inforce 2022 Security Conference for Amazon Web Services. Since compliance is driving…
AWS s3 Encryption and Data Protection
Having just returned from AWS’s security event, re:Inforce, in Boston, after a three-year hiatus, I was inspired and encouraged by what I learned looking around…
As Compliance Requirements Mount, Companies Struggle to Bring Data Security and Privacy Practices up to Speed
The compliance landscape is becoming more complex for U.S. companies, especially those conducting business in multiple states and internationally. In 2022 alone, Connecticut and Utah…
Cloud Security – Securing Cloud AI Data Pipelines
Recent attacks on Jupyter Notebook show threat actors exploit cloud-based data science platforms. And as companies are transitioning from on-premises data centers to private cloud,…