Blog

Ameesh Divatia talks with CyberNews about the most efficient ways enterprises can protect sensitive data in the cloud

Large-scale businesses, healthcare sectors, and government institutions are often primary targets of cyberattacks due to the extensive amounts of sensitive data they possess.  Hackers turn…

A Blueprint for Cybersecurity Investments in 2022

From a funding standpoint, 2021 was a banner year for cybersecurity startups. Through Q3 alone, new companies netted more than $14 billion in venture capital…

Baffle x Snowflake

The Data Journey

Protecting Data Pipelines End to End, Making Breaches Irrelevant Deriving intelligence out of enterprise data via Artifical Intelligence and Machine Learning is becoming more and more desired…

Cloud Computing Diagram

Data Security Platforms Represent a New Reality in Data Protection

Since Baffle’s inception, we have enthusiastically asserted that data protection should be the North Star for any successful security initiative. The objective should not just…

Protecting Your Data in Your Cloud with the Baffle Data Privacy Cloud

As organizations continue to build out their cloud-based data lakes and analytics environments, there’s a huge push to implement data privacy and de-identification methods for…

SINET16 Banner Baffle

Baffle Earns SINET16 Innovator Award for its Excellence in Data-centric Cyber Security Protection

To say Q3 has been an exciting quarter for Baffle would be an understatement. On the heels of our $20 million fundraising round in August,…

A Message From CEO and Co-founder Ameesh Divatia on Baffle’s Series B Funding

Since Baffle’s inception in 2015, we’ve strived to look at data protection through a unique lens. That idea is simple: Assume that breaches will happen…

How to protect cloud data anywhere using a data security mesh

How To Protect Cloud Data Anywhere Using A Data Security Mesh

It was, literally and figuratively, the perfect storm. A blizzard forced everyone from a Wall Street wealth management firm to work from home. At the…

Protecting cloud data throughout its lifecycle

Protecting Cloud Data Throughout Its Lifecycle

Organizations have flocked from on-premises to the cloud over the past year, and protecting data during the transition has proven to be a monumental task….

tokenization

Is Tokenization a Good Way to Protect Your Data?

This blog looks at the functionality of vault-based data tokenization methods and some key data protection challenges in using such approaches in cloud security and modern compute…