Blog
CCPA Compliance: Are Your Data Security Protocols CCPA-Ready?
On January 1, 2020, the California Consumer Privacy Act (CCPA) became operational, however, enforcement of privacy-related suits cannot be initiated until July 1. The regulation,…
Why you can’t stop data breaches – Part I
Data Breaches Over the past decade plus, we’ve seen a continued onslaught of data breaches via cyber-attacks, phishing scams, malware, ransomware, and other new cybercriminal activity. And there are no…
Secure data analytics and info sharing for healthcare
Obviously, there’s a lot of focus on the healthcare industry these days and rightly so. We’ve been working with several organizations recently with our secure…
Information sharing and accelerating response times in the face of crises
In October 2019, the Center for Strategic and International Studies (CSIS) ran three simulated scenarios to map how nations, organizations and economies would respond in…
Using SMPC for Threat Intel Sharing
As privacy continues to rise in importance as a critical mandate for how businesses operate, cryptographic techniques such as homomorphic encryption and secure multi-party compute…
Nothing to Celebrate on National Data Privacy Day
Today is National Data Privacy Day, an annual event which “commemorates the Jan. 28, 1981, signing of Convention 108, the first legally binding international treaty…
Simplified Data Masking. Simplified Compliance.
Last week, we announced a new offering in Baffle Data Security’s product portfolio — simplified data masking and exfiltration control. The solution provides organizations with…
Jail Time for Data Breaches?
We were at lunch with a customer the other day and started talking about various privacy initiatives and upcoming regulations such as the California Consumer…
Privacy Preserving Analytics – Creation of a New Category!
On a bright warm August afternoon, I was having lunch with a friend when I noticed an email from a Gartner analyst congratulating us…
Baffle Certified as an AWS Database Ready Partner
At Baffle, we’ve continued to focus on protecting data wherever it lives. We have a “no code” simplified approach to encryption that is protecting in…