Blog

The Secret to Secure Data? Supporting Your CISO

Few executive positions are as pressure-packed as the chief information security officer (CISO). In one study, 21% of CISOs said their companies offered no support…

Ameesh Divatia appears on theCUBE at AWS re:Inforce to talk about proxy architecture and the future of data security

Baffle CEO Ameesh Divatia talks with John Furrier of theCUBE at the AWS re:Inforce 2022 Security Conference for Amazon Web Services. Since compliance is driving…

AWS s3 Encryption and Data Protection

Having just returned from AWS’s security event, re:Inforce, in Boston, after a three-year hiatus, I was inspired and encouraged by what I learned looking around…

Compliance Budget Survey

As Compliance Requirements Mount, Companies Struggle to Bring Data Security and Privacy Practices up to Speed

The compliance landscape is becoming more complex for U.S. companies, especially those conducting business in multiple states and internationally. In 2022 alone, Connecticut and Utah…

Securing AI Data Pipelines Image

Cloud Security – Securing Cloud AI Data Pipelines

Recent attacks on Jupyter Notebook show threat actors exploit cloud-based data science platforms. And as companies are transitioning from on-premises data centers to private cloud,…

Secure Data Sharing Graphic

How to Secure Data in a ‘Need-To-Share’ Business Environment

For decades, data was siloed and locked away, and there were limited reasons for accessing this valuable asset, let alone sharing it. As such, data…

Baffle x IBM Cloud

How to De-Identify Your Data in IBM Cloud with Baffle Data Protection Services

IBM Cloud offers an extensive portfolio of cloud-native databases that IBM provides as secure, production ready, and fully managed database technologies, to enable developers to…

Step by Step Guide for Data Protection with Baffle and IBM Cloud Hyper Protect DBaaS for PostgreSQL

Introduction: IBM Cloud and Baffle Data Protection Services (DPS) for IBM Cloud enable provisioning of Baffle Manager and Baffle Shield and configure database encryption/decryption rules…

Ameesh Divatia talks with CyberNews about the most efficient ways enterprises can protect sensitive data in the cloud

Large-scale businesses, healthcare sectors, and government institutions are often primary targets of cyberattacks due to the extensive amounts of sensitive data they possess.  Hackers turn…

A Blueprint for Cybersecurity Investments in 2022

From a funding standpoint, 2021 was a banner year for cybersecurity startups. Through Q3 alone, new companies netted more than $14 billion in venture capital…