
Data Risk Mitigation via Data Masking
Data at Rest is Data at Risk. Mitigate the Risk through Data-Centric Security
Data Risk Mitigation … the need for it is on the rise in the United States and around the globe. Read More
Data at Rest is Data at Risk. Mitigate the Risk through Data-Centric Security
Data Risk Mitigation … the need for it is on the rise in the United States and around the globe. Read More
Encryption key management is one of the most important “basics” for an organization dealing with security and privacy protection. Major data losses and regulatory compliance requirements have prompted a dramatic increase in the use of encryption within corporate data centers. Read More
Data privacy breaches are becoming more and more prevalent and common in the United States today. Â Did you know that on average, as many as 72,000 documented breaches of personally identifiable information (i.e. Read More
This article deals with pseudonymization as one method of de-identifying or anonymizing sensitive data.
The unauthorized use or misuse of our personally identifiable information (or PII) — such as name, social security number, date of birth, mother’s maiden name, place of birth, etc. Read More
It is a common mistake to refer to data masking and data encryption interchangeably to mean the same things. While field-level encryption is considered one of many possible “data masking” functions, we define data masking and encryption as technically distinct processes below. Read More