Data Security Blog

Read our expert opinion on data and application security and industry insights.

Limitations of Native and Open Source Anonymization Tools

Limitations of Native and Open Source Anonymization Tools

There are plenty of reasons why an organization might need to mask its data, in both production and non-production (or pre-production) environments. Unfortunately, masking (or other forms of data anonymization) is too often an afterthought, with developers looking for either “native” masking solutions included with their current database tools...
5 Common Mistakes Organizations Make During Data Obfuscation

5 Common Mistakes Organizations Make During Data Obfuscation

02September, 2020What is Data Obfuscation? As the name suggests, data obfuscation is the process of hiding ...
3 things you might be doing wrong in your data protection program

3 things you might be doing wrong in your data protection program

The interest in the protection of sensitive information has seen an exponential increase in recent times. Now with consumers more aware of their rights and the importance of their personal information ....
Sensitive Data Discovery: The First Step of a Robust Security Strategy

Sensitive Data Discovery: The First Step of a Robust Security Strategy

The age-old method of perimeter security does not suffice today. Today, what we need is protection of data at the source. But how do you do this without discovering sensitive data?
Difference between Encryption, Tokenization, and Masking

Difference between Encryption, Tokenization, and Masking

A breakdown of each method and their benefits to find out which solution you should opt for.
Everything you need to know about the PDPA

Everything you need to know about the PDPA

An in-detail look into the PDPA and how to achieve compliance.
Reidentification Risk of Masked Datasets: Part 1

Reidentification Risk of Masked Datasets: Part 1

Find out how to overcome the risk data reidentification and where to focus your efforts when it comes to anonymizing your data.
Reidentification Risk of Masked Datasets: Part 2

Reidentification Risk of Masked Datasets: Part 2

In part 1, we talked about what to focus on while anonymizing your data. Now, let's discuss how to eliminate the risk of reidentification.
Differences between Data Protection and Data Privacy

Differences between Data Protection and Data Privacy

The terms data protection and data privacy are often used synonymously, but mean different things. Find out the core differences between them.
Data Security Challenges in Education Industry

Data Security Challenges in Education Industry

The education sector holds an immense amount of highly sensitive information, attracting many threats. Read more to find out how you can secure your data.
Data Security Challenges in Retail Industry

Data Security Challenges in Retail Industry

Goods and services are increasingly being sold online. Learn how retailers can protect themselves from cyber crime.
Data Security Challenges in Healthcare Industry

Data Security Challenges in Healthcare Industry

Cybercrime is on the rise; how can hospitals better protect themselves from it? Read our blog to find out.
Data Minimization (GDPR): Are you doing it right?

Data Minimization (GDPR): Are you doing it right?

The only way to be doing data minimization. Read more to find out.
Data Security Risk of Dark Data

Data Security Risk of Dark Data

Organizations often hoard huge amounts of sensitive data long after its business benefit. Learn why this is dangerous, and how you can tackle this.
Everything you need to know about the CCPA

Everything you need to know about the CCPA

An in-detail look into the CCPA and how to prepare for compliance.
Artificial Intelligence and The Right to be Forgotten

Artificial Intelligence and The Right to be Forgotten

Data privacy laws like GDPR and CCPA deem it essential to give users control over their data. Why then, is the same concept not applicable to AI?
Data Security Challenges in Financial Service Industry

Data Security Challenges in Financial Service Industry

Data Security in the Financial Service Industry - Challenges and Solutions
Everything you need to know about the GDPR

Everything you need to know about the GDPR

An in-detail look into the current state of GDPR and the future of data protection.
Challenges in Enterprise Application Data Security

Challenges in Enterprise Application Data Security

Critical applications by nature are high risk. Here are five challenges you are most likely to face while securing them and how you can solve them.
Don’t Overlook Data Security in the Times of CoVid-19

Don’t Overlook Data Security in the Times of CoVid-19

Learn how data security in the digital world is just as important as personal hygiene in the physical world.
Challenges in Cross border data security

Challenges in Cross border data security

It is a part of a business strategy to ensure that data be shared freely to offshore locations. How do you go about securing that data?
Does Compliance mean Data Security?

Does Compliance mean Data Security?

A compliance certificate tells you that your security is up to the mark. But does compliance itself mean security?
Test Data Management Best Practices

Test Data Management Best Practices

Data anonymization: The Gold Standard in protecting sensitive data in your application development and test environments.
Differences between Anonymization and Pseudonymization

Differences between Anonymization and Pseudonymization

Often, the terms anonymization and pseudonymization are used interchangeably, but they're different methods. Read more to find out the difference.