July 1st, 2020

Ameesh Divatia, CEO and Co-Founder, Baffle

Combining Data Utilization and Privacy

Today marks the first day of enforcement of the California Consumer Privacy Act, a milestone day for all of us, who, as individuals, worry about our privacy in a hyperconnected world. This landmark regulation gives consumers greater control over how their data is used and…

Read More

Today marks the first day of enforcement of the California Consumer Privacy Act, a milestone day for all of us, who, as individuals, worry about our privacy in a hyperconnected world. This landmark regulation gives consumers greater control over how their data is used and…

Read More

May 26th, 2020

Ameesh Divatia, CEO and Co-Founder, Baffle

Are GDPR and Other Privacy Regulations Enough?

Two years ago, the General Data Protection Regulation (GDPR) was introduced and hailed as the most important change in data privacy regulation in two decades. Originating in the EU, GDPR empowered consumers to not only have a right to know what their data will be…

Read More

Two years ago, the General Data Protection Regulation (GDPR) was introduced and hailed as the most important change in data privacy regulation in two decades. Originating in the EU, GDPR empowered consumers to not only have a right to know what their data will be…

Read More

May 13th, 2020

Priyadarshan ‘PD’ Kolte, Co-Founder & CTO, Baffle, Inc.

Why data tokenization is insecure

(Why you can’t stop data breaches – Part II) This blog, the second in a series on “Why you can’t stop data breaches”, details various attack methods used to compromise a set of common tokenization methods. The first entry in the series discussed database level…

Read More

(Why you can’t stop data breaches – Part II) This blog, the second in a series on “Why you can’t stop data breaches”, details various attack methods used to compromise a set of common tokenization methods. The first entry in the series discussed database level…

Read More

May 1st, 2020

Ameesh Divatia, CEO and Co-Founder, Baffle

Are Your Data Security Protocols CCPA-Ready?

On January 1, 2020, the California Consumer Privacy Act (CCPA) became operational, however, enforcement of privacy-related suits cannot be initiated until July 1. The regulation, similar to the EU’s General Data Protection Regulation (GDPR), seeks to offer people greater control over the sharing of their…

Read More

On January 1, 2020, the California Consumer Privacy Act (CCPA) became operational, however, enforcement of privacy-related suits cannot be initiated until July 1. The regulation, similar to the EU’s General Data Protection Regulation (GDPR), seeks to offer people greater control over the sharing of their…

Read More

April 24th, 2020

Harold Byun, VP Products

Why you can’t stop data breaches – Part I

Over the past decade plus, we’ve seen a continued onslaught of data breaches that shows no signs of slowing down. And as we talk with prospects, we continue to get the the same questions over and over again. – How are you different than database…

Read More

Over the past decade plus, we’ve seen a continued onslaught of data breaches that shows no signs of slowing down. And as we talk with prospects, we continue to get the the same questions over and over again. – How are you different than database…

Read More

April 17th, 2020

Harold Byun, VP Products

Secure data analytics and info sharing for healthcare

Obviously, there’s a lot of focus on the healthcare industry these days and rightly so. We’ve been working with several organizations recently with our secure data sharing platform to facilitate privacy preserving analytics on data across multiple organizations and third parties. The technique enables anonymization…

Read More

Obviously, there’s a lot of focus on the healthcare industry these days and rightly so. We’ve been working with several organizations recently with our secure data sharing platform to facilitate privacy preserving analytics on data across multiple organizations and third parties. The technique enables anonymization…

Read More

April 2nd, 2020

Harold Byun, VP Products

Information sharing and accelerating response times in the face of crises

In October 2019, the Center for Strategic and International Studies (CSIS) ran three simulated scenarios to map how nations, organizations and economies would respond in the face of a global crisis. The three scenarios were a nation state cyber attack and disinformation campaign against the…

Read More

In October 2019, the Center for Strategic and International Studies (CSIS) ran three simulated scenarios to map how nations, organizations and economies would respond in the face of a global crisis. The three scenarios were a nation state cyber attack and disinformation campaign against the…

Read More

February 11th, 2020

Harold Byun, VP Products

Using SMPC for Threat Intel Sharing

As privacy continues to rise in importance as a critical mandate for how businesses operate, cryptographic techniques such as homomorphic encryption and secure multi-party compute (SMPC) have received a lot more recognition.While there are similarities in terms of some of the capabilities that the two…

Read More

As privacy continues to rise in importance as a critical mandate for how businesses operate, cryptographic techniques such as homomorphic encryption and secure multi-party compute (SMPC) have received a lot more recognition.While there are similarities in terms of some of the capabilities that the two…

Read More