Tag "data masking"

Part 2: The Importance of Test Data Management for Development and Operations

In my previous blog on The Importance of Test Data Management for DevOps Part 1, I discussed how Test Data Management tools complement test management and automation tools to support DevOps. I discussed the following key capabilities of Test Data Management that fills the gaps left by test automation solutions: Sensitive Data Protection Test data... more

What’s the Cost of a Data Breach in Telecoms?

Now that the European Union has passed the General Data Protection Regulation (GDPR) many Communications Service Providers (CSPs) are taking steps to ensure they are ready for the regulations and protected from the risk of a data breach. In general the telecoms industry has been focused on security for a long time but the focus... more

Healthcare Data Masking: Tokenization, HIPAA and More

When trying to protect your data from the nefarious souls that would like access to it (?), there are several options available that apply to very specific use cases. In order for us to talk about the different solutions – it is important to define all of the terms: PII – Personally Identifiable Information –... more

Which Method of Controls Should You Use to Protect Sensitive Data in Databases and Enterprise Applications? Part II

To determine what is the appropriate sensitive data protection method to use, you should first answer the following questions regarding the requirements: Do you need to protect data at rest (in storage), during transmission, and/or when accessed? Do some privileged users still need the ability to view the original sensitive data or does sensitive data... more

Which Method of Controls Should You Use to Protect Sensitive Data in Databases and Enterprise Applications? Part I

I’m often asked to share my thoughts about protecting sensitive data. The questions that typically come up include: Which types of data should be protected? Which data should be classified as “sensitive?” Where is this sensitive data located? Which groups of users should have access to this data? Because these questions come up frequently, it... more