
Data Security in the Business World: Navigating Challenges
Threats of data breaches and cyberattacks have intensified over the years. In 2025 alone, the total damage cost is already forecast to reach up to $10.5 trillion. Read More
Threats of data breaches and cyberattacks have intensified over the years. In 2025 alone, the total damage cost is already forecast to reach up to $10.5 trillion. Read More
As you may already know, IRI DarkShield produces search annotations and masking results with every operation. These log files can contain a large volume of data, including:
metadata about the file/database source(s) what data was found as a match which matcher matched the data how the data was masked (if it was) where matches occurred within each file or database. Read MoreAbstract: HIPAA, GDPR, FERPA, and other data privacy laws require that personally identifiable information (PII) and related data considered sensitive be protected from disclosure or discovery. Read More
Article 17 of the General Data Protection Regulation (GDPR) stipulates the need to minimize aging data through deletion, as well as the ad hoc Right to Erasure, often referred to as the Right to be Forgotten. Read More
Editors Note: This articles covers data anonymization as a form of data masking for privacy protection. In particular, it covers the concepts of quasi-identifiers and re-identification risk and the use of HIPAA data de-identification standards for protecting sensitive data in research through the use of anonymizing techniques like age blurring and demographic attribute blurring in conjunction with re-ID risk scoring. Read More
One of the biggest concerns with releasing a dataset is the risk that a potential attacker can identify the owners of particular records. Even though masking or removing unique identifiers, like names and Social Security Numbers, can reduce that risk substantially, it may still not be enough. Read More
Enterprise data continues to change rapidly in form, size, use, and residence. Rarely does it remain in siloed constructs anymore, limited to certain business units or untouched by the outside world. Read More