Masking PII in ACH Files
Abstract: This article discusses the content and obfuscation of sensitive sender or receiver information in ACH (NACHA) files, which are regularly used by banks and businesses to transmit payroll and payment data. Read More
Abstract: This article discusses the content and obfuscation of sensitive sender or receiver information in ACH (NACHA) files, which are regularly used by banks and businesses to transmit payroll and payment data. Read More
Abstract: This article examines why automated data discovery and masking are becoming essential controls for the rare earth minerals industry and how IRI data discovery and masking software enables companies, joint ventures, and government-aligned operators to protect sensitive information, reduce exposure, and maintain operational advantage without impeding analytics, collaboration, or innovation. Read More
Abstract: This article discusses the content and obfuscation of historically used banking industry files using the IRI FieldShield data masking tool on proprietary tag-based formats (e.g., Read More
Abstract: This article covers the necessary JDBC and ODBC connectivity steps to reach Azure Databricks Delta tables from IRI Workbench and the CoSort SortCL engine used in structured data management operations in the Voracity platform ecosystem, especially IRI FieldShield data classification and masking jobs. Read More
The Cybersecurity Maturity Model Certification (CMMC) is a cornerstone of the U.S. Department of Defense (DoD) strategy to safeguard Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) across the Defense Industrial Base (DIB). Read More
As data volumes available for research, resting, data science projects, and AI models continue to grow, so does the urgency to protect sensitive information they contain from exposure. Read More
Maintaining GDPR compliance while creating AI models doesn’t have to feel impossible. The key lies in using GDPR data masking techniques, which safeguard privacy without hurting how well models work. Read More
In an age where data privacy is under the microscope, selecting the right strategy for protecting sensitive information is no longer optional—it’s mandatory. For developers, data officers, and AI teams, deciding between a data anonymization tool and pseudonymization isn’t just a technical choice—it’s a strategic one. Read More
Voice recordings can contain personally identifiable information (PII), such as names, phone numbers, or other sensitive data embedded in spoken words.
According to Mediartis, “The CNIL (French GDPR Supervisory Authority) provides examples of personal data such as photos, voice recordings, first or last names, pseudonyms, dates of birth, telephone numbers, social security numbers, postal addresses, email addresses, fingerprints, retinal prints and more”. Read More
AI and machine learning are only as good as the data that fuel and teach them. Whether you’re building models for predictive analytics, computer vision, or natural language processing, the importance of high-quality, representative data can’t be overstated. Read More
Governance-driven data architects are increasingly adopting ETL masking workflows to ensure data privacy and compliance without disrupting analytics, operations, or development. As data moves from one environment to another—especially during extraction, transformation, and loading (ETL)—it’s critical to protect sensitive data from unauthorized access. Read More