Increasing Sensitive Data Visibility and Control: Best Practices
You might know the old saying, “What gets measured gets managed.” It rings true even in the IT sector. But there’s a catch—how can you manage and measure what you can’t see? Read More
You might know the old saying, “What gets measured gets managed.” It rings true even in the IT sector. But there’s a catch—how can you manage and measure what you can’t see? Read More
Abstract: Amid the still-growing problem of data breaches, and new v3 requirements of the Payment Card Industry Data Security Standard (PCI DSS) in effect, it has never been more important to protect sensitive data properly. Read More
Data Privacy on Fire For the past 20 years or so, data breach headlines continue to capture public and legal attention. Significant data breaches are chronicled at the Privacy Rights Clearinghouse on this page. Read More
According to Trent Henry of the Burton Group,
Data protection needs to take into account both internal and external threats, including those against critical database and application resources. Read More
Editors Note: This article refers only to full or partial column/field redaction of strings in structured database or flat files, and thus one of many static (and API-driven dynamic) data masking functions available in IRI FieldShield. Read More
Editor’s Note: Note that this article refers to older but still supported methods for obfuscating PII elements like dates of birth and ages in IRI FieldShield. Read More
Encryption key management is one of the most important “basics” for an organization dealing with security and privacy protection. Major data losses and regulatory compliance requirements have prompted a dramatic increase in the use of encryption within corporate data centers. Read More
Data privacy breaches are becoming more and more prevalent and common in the United States today. Â Did you know that on average, as many as 72,000 documented breaches of personally identifiable information (i.e. Read More
It is a common mistake to refer to data masking and data encryption interchangeably to mean the same things. While field-level encryption is considered one of many possible “data masking” functions, we define data masking and encryption as technically distinct processes below. Read More