MENTIS is now Mage. READ MORE >
Read our expert opinion on data and application security and industry insights.
Data Security in the Cloud: Is the Default Security Provided by the Cloud Service Provider Enough?
READ MORE >
What is Brazil’s LGPD?
Need Data Masking? Here’s What to Look for in a Solution
What Businesses Need to Know About India’s Data Protection Bill, 2021
6 Common Data Anonymization Mistakes Businesses Make Every Day
What Businesses Need to Know About Thailand's Data Privacy Law: PDPA
Role of Sensitive Data Discovery in Regulatory Compliance
Data Retention vs. Data Privacy: What Should Employers Do?
What is the Difference Between Mage™ and Open-Source Data Masking Solutions?
Data Privacy Day is Just the Beginning: How Companies Must Tackle Privacy in the Coming Years
Cloud Migration and Data Security: Understanding What Needs to Be Done
Database - Embedded Approach to Dynamic Data Masking - Use Cases
Everything You Need to Know About the California Privacy Rights Act (CPRA)
6 ways to prevent cyber attacks
Limitations of Native and Open Source Anonymization Tools
5 Common Mistakes Organizations Make During Data Obfuscation
3 things you might be doing wrong in your data protection program
Sensitive Data Discovery: The First Step of a Robust Security Strategy
Difference between Encryption, Tokenization, and Masking
Everything you need to know about the PDPA
Reidentification Risk of Masked Datasets: Part 1
Reidentification Risk of Masked Datasets: Part 2
Differences between Data Protection and Data Privacy
Data Security Challenges in Education Industry
Data Security Challenges in Retail Industry
Data Security Challenges in Healthcare Industry
Data Minimization (GDPR): Are you doing it right?
Data Security Risk of Dark Data
Everything you need to know about the CCPA
Artificial Intelligence and The Right to be Forgotten
Data Security Challenges in Financial Service Industry
Everything you need to know about the GDPR
Challenges in Enterprise Application Data Security
Don’t Overlook Data Security in the Times of CoVid-19
Challenges in Cross border data security
Does Compliance mean Data Security?
Test Data Management Best Practices
Differences between Anonymization and Pseudonymization