Yay we got SOC 2 for the holidays
Just in time for the end of the year when people are rushing to finish things off, our gift to you is (drumroll please)... SOC 2 compliance!
Just in time for the end of the year when people are rushing to finish things off, our gift to you is (drumroll please)... SOC 2 compliance!
We’re excited to announce the general availability of CipherStash EQL for Python, our advanced solution for searchable, client-side data encryption for PostgreSQL. CipherStash EQL for Python — eqlpy for short — enables encryption in use, without significant changes to your application code or PostgreSQL database.
We’re excited to announce general availability of CipherStash for DynamoDB, our cutting-edge solution for client-side data encryption and server-side encrypted search in Amazon DynamoDB.
Security outcomes are not just delivered by the security team. How can security teams more effectively work with the rest of the business?
Don't just rely on encryption at rest and in transit to protect your sensitive data. Use searchable encryption to enable encryption in use to harden data privacy in Postgres.
When writing code that deals with sensitive information like passwords or payment data, it's important to zeroize memory when you're done with it. Failing to do so can leave sensitive in memory even after the program is terminated and even end up on disk when the computer uses swap.
Large enterprises face especially difficult data protection challenges posed by the scale and diversity of the data they collect and store, the complexity of enterprise organizational structures, the likelihood of facing targeted attacks, and the difficulty in coordinating thousands of employees to move quickly to mitigate risks.
The effectiveness of your data governance program is determined by how much care and attention you put into the design of its strategy.
This article will introduce to some PostgreSQL best practices you can implement for access and storage security.
We built CipherStash to make it easy to protect sensitive data with searchable encryption. Until now, that has meant moving your data to a CipherStash-managed database.
Optus just had Australia's biggest ever data breach. Here's what might have happened and how it could have been prevented.
It turns out there’s heaps we can learn from API security improvements and apply to databases. Here are the top 3!
The OWASP Top 10 has recently been updated, and it has recognised Cryptographic Failures as the #2 vulnerability category.
I spoke to host, Sam Brown about why CipherStash could be a gamechanger for enterprise data security.
We are excited to announce that Dr David Wu, Assistant Professor at the University of Virginia, has joined CipherStash as an official advisor
With data breaches continuing to threaten our privacy and data security, are current data protection schemes enough?
Check us out on Github, or book a discovery call to learn more.