Increasing Sensitive Data Visibility and Control: Best Practices
You might know the old saying, “What gets measured gets managed.” It rings true even in the IT sector. But there’s a catch—how can you manage and measure what you can’t see? Read More
You might know the old saying, “What gets measured gets managed.” It rings true even in the IT sector. But there’s a catch—how can you manage and measure what you can’t see? Read More
One of the primary uses of IRI FieldShield is to encrypt and decrypt sensitive data in database or flat-file columns. FieldShield relies on a passphrase to derive a symmetrical encryption key used at encryption and decryption time. Read More
Usually static data masking is performed on production data at rest so it is stored safely, or when replicated to non-production environments for testing or development purposes. Read More
Introduction: This example demonstrates an older method of using IRI FieldShield to protect sensitive data prior to indexing the data in Splunk. As you will read, FieldShield would process the data outside of Splunk and create a CSV file for Splunk’s ingestion. Read More
This is the last in a four-part series to introduce IRI CellShield. An overview is found here. The following parts demonstrate how to use the other functions in CellShield: data masking and encryption. Read More
This is the third in a four-part series describing IRI CellShield data masking software for Excel, and its format-preserving encryption function in particular; the series overview starts here. Read More
This is the second in a four-part series to introduce IRI CellShield. An overview is found here. The other parts demonstrate how to use more functions in CellShield like encryption and pseudonymization. Read More
This article is third in a 3-part series on CLF and ELF web log data. We first introduced CLF and ELF web log formats, then introduced IRI solutions for processing web log data, and here we conclude by masking private data in web log files. Read More
Data Privacy on Fire We’re still seeing data breach headlines burning across news outlets and social media, fast and hot:
The Equifax Breach was Entirely Preventable – Wired States Investigate Experian Data Breach – Krebs on Security ‘Heartbleed’ Bug in OpenSSL Exposes Millions of Online Passwords – Reuters Millions of Target Customers’ Credit, Debit Card Accounts May Be Hit by Data Breach – NBC News Neiman Marcus Data Breach Worse Than First Said – New York Times Retailers Hit by Credit-Data Breach Smaller Than Target’s – Bloomberg NewsAnd the fire burns on. Read More
Submitting one’s credit card details electronically can be disconcerting (e.g., via physical scanner or internet purchase). The personally identifiable information it contains can lead to fraudulent charges, identify theft, and so on. Read More