Quantcast
Channel: data pseudonymization Archives - IRI
Browsing latest articles
Browse All 5 View Live

Data Masking and Data Encryption Are Different

It is a common mistake in the industry to use the terms data masking and data encryption interchangeably to mean the same things.  Data masking and data encryption are two distinct processes as we will...

View Article



What is Data Pseudonymization?

This blog thread deals with pseudonymization as one method of de-identifying or anonymizing sensitive data. The unauthorized use or misuse of our personally identifying information (or PII) — such as...

View Article

Which Data Masking Function Should I Use?

According to Simson L. Garfinkel at the NIST Information Access Division’s Information Technology Laboratory, De-identification is not a single technique, but a collection of approaches, algorithms,...

View Article

All About IRI Set Files: A Primer

Introduction: In the context of IRI software, set files are text files containing realistic or replacement values for data management applications in the IRI Voracity platform ecosystem.  Read More The...

View Article

Consistent, Self-Updating and Secure Pseudonymization

What is Pseudonymization? Pseudonymization is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another,...

View Article

Browsing latest articles
Browse All 5 View Live




Latest Images