Limitations of Native and Open Source Anonymization Tools
There are plenty of reasons why an organization might need to mask its data, in both production and non-production (or pre-production) environments. Unfortunately, masking (or other forms of data anonymization) is too often an afterthought, with developers looking for either “native” masking solutions included with their current database tools...
5 Common Mistakes Organizations Make During Data Obfuscation
02September, 2020What is Data Obfuscation?
As the name suggests, data obfuscation is the process of hiding ...
3 things you might be doing wrong in your data protection program
The interest in the protection of sensitive information has seen an exponential increase in recent times. Now with consumers more aware of their rights and the importance of their personal information ....
Sensitive Data Discovery: The First Step of a Robust Security Strategy
The age-old method of perimeter security does not suffice today. Today, what we need is protection of data at the source. But how do you do this without discovering sensitive data?
Difference between Encryption, Tokenization, and Masking
A breakdown of each method and their benefits to find out which solution you should opt for.
Everything you need to know about the PDPA
An in-detail look into the PDPA and how to achieve compliance.
Reidentification Risk of Masked Datasets: Part 1
Find out how to overcome the risk data reidentification and where to focus your efforts when it comes to anonymizing your data.
Reidentification Risk of Masked Datasets: Part 2
In part 1, we talked about what to focus on while anonymizing your data. Now, let's discuss how to eliminate the risk of reidentification.
Differences between Data Protection and Data Privacy
The terms data protection and data privacy are often used synonymously, but mean different things. Find out the core differences between them.
Data Security Challenges in Education Industry
The education sector holds an immense amount of highly sensitive information, attracting many threats. Read more to find out how you can secure your data.
Data Security Challenges in Retail Industry
Goods and services are increasingly being sold online. Learn how retailers can protect themselves from cyber crime.
Data Security Challenges in Healthcare Industry
Cybercrime is on the rise; how can hospitals better protect themselves from it? Read our blog to find out.
Data Minimization (GDPR): Are you doing it right?
The only way to be doing data minimization. Read more to find out.
Data Security Risk of Dark Data
Organizations often hoard huge amounts of sensitive data long after its business benefit. Learn why this is dangerous, and how you can tackle this.
Everything you need to know about the CCPA
An in-detail look into the CCPA and how to prepare for compliance.
Artificial Intelligence and The Right to be Forgotten
Data privacy laws like GDPR and CCPA deem it essential to give users control over their data. Why then, is the same concept not applicable to AI?
Data Security Challenges in Financial Service Industry
Data Security in the Financial Service Industry - Challenges and Solutions
Everything you need to know about the GDPR
An in-detail look into the current state of GDPR and the future of data protection.
Challenges in Enterprise Application Data Security
Critical applications by nature are high risk. Here are five challenges you are most likely to face while securing them and how you can solve them.
Don’t Overlook Data Security in the Times of CoVid-19
Learn how data security in the digital world is just as important as personal hygiene in the physical world.
Challenges in Cross border data security
It is a part of a business strategy to ensure that data be shared freely to offshore locations. How do you go about securing that data?
Does Compliance mean Data Security?
A compliance certificate tells you that your security is up to the mark. But does compliance itself mean security?
Test Data Management Best Practices
Data anonymization: The Gold Standard in protecting sensitive data in your application development and test environments.
Differences between Anonymization and Pseudonymization
Often, the terms anonymization and pseudonymization are used interchangeably, but they're different methods. Read more to find out the difference.