Data Masking and Data Encryption Are Different
It is a common mistake in the industry to use the terms data masking and data encryption interchangeably to mean the same things. Data masking and data encryption are two distinct processes as we will...
View ArticleWhat is Data Pseudonymization?
This blog thread deals with pseudonymization as one method of de-identifying or anonymizing sensitive data. The unauthorized use or misuse of our personally identifying information (or PII) — such as...
View ArticleWhich Data Masking Function Should I Use?
According to Simson L. Garfinkel at the NIST Information Access Division’s Information Technology Laboratory, De-identification is not a single technique, but a collection of approaches, algorithms,...
View ArticleAll About IRI Set Files: A Primer
Introduction: In the context of IRI software, set files are text files containing realistic or replacement values for data management applications in the IRI Voracity platform ecosystem. Read More The...
View ArticleConsistent, Self-Updating and Secure Pseudonymization
What is Pseudonymization? Pseudonymization is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another,...
View Article
More Pages to Explore .....