Featured articles
Latest articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/669767dff8c2d31302bc4369_use-piiano-vault-to-protect-customers-secrets.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/669767dff8c2d31302bc4369_use-piiano-vault-to-protect-customers-secrets.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/669767dff8c2d31302bc4369_use-piiano-vault-to-protect-customers-secrets.png)
Use Piiano Vault to protect your customers’ secrets with encryption or tokenization
Privacy
Use Piiano Vault to protect your customers’ secrets with encryption or tokenization
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/669767dff8c2d31302bc4369_use-piiano-vault-to-protect-customers-secrets.png)
ByÂ
Moty Michaely
July 17, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/668528a65a951e8e57094d2c_test.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/668528a65a951e8e57094d2c_test.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/668528a65a951e8e57094d2c_test.png)
What is Application Level Encryption? Benefits & Implementation
Security
What is Application Level Encryption? Benefits & Implementation
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/668528a65a951e8e57094d2c_test.png)
ByÂ
Ariel Shiftan
June 27, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6673d822d4a428ae9d607c64_your-code-review-can-be-better.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6673d822d4a428ae9d607c64_your-code-review-can-be-better.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6673d822d4a428ae9d607c64_your-code-review-can-be-better.jpeg)
Automated Code Audits: Tools, Types, and Benefits
Security
Automated Code Audits: Tools, Types, and Benefits
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6673d822d4a428ae9d607c64_your-code-review-can-be-better.jpeg)
ByÂ
Gil Dabah
June 20, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/665d646c157f0924e8d52074_pci-dss-soc2-certification.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/665d646c157f0924e8d52074_pci-dss-soc2-certification.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/665d646c157f0924e8d52074_pci-dss-soc2-certification.png)
News - Piiano Achieves PCI DSS and SOC2 Certification
Security
News - Piiano Achieves PCI DSS and SOC2 Certification
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/665d646c157f0924e8d52074_pci-dss-soc2-certification.png)
ByÂ
Gil Dabah
June 3, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/663a06c41867ba8e7d8b1b06_protect-customers-secrets-featured-image.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/663a06c41867ba8e7d8b1b06_protect-customers-secrets-featured-image.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/663a06c41867ba8e7d8b1b06_protect-customers-secrets-featured-image.png)
How to Protect Customers' Secrets in Your SaaS Offering: Detailed Guide
Privacy
How to Protect Customers' Secrets in Your SaaS Offering: Detailed Guide
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/663a06c41867ba8e7d8b1b06_protect-customers-secrets-featured-image.png)
ByÂ
Moty Michaely
May 3, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6631efe0db94085ea443edbf_separating-control-and-data-functions.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6631efe0db94085ea443edbf_separating-control-and-data-functions.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6631efe0db94085ea443edbf_separating-control-and-data-functions.png)
Piiano Vault Architecture – 60K RPS, 300 million rows, low latency w/PostgreSQL
Security
Piiano Vault Architecture – 60K RPS, 300 million rows, low latency w/PostgreSQL
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6631efe0db94085ea443edbf_separating-control-and-data-functions.png)
ByÂ
David Erel
May 1, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/662905fdd63cd54c43f66423_Screenshot%202024-04-24%20091451%20(1).jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/662905fdd63cd54c43f66423_Screenshot%202024-04-24%20091451%20(1).jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/662905fdd63cd54c43f66423_Screenshot%202024-04-24%20091451%20(1).jpg)
Introduction to Software Reverse Engineering [To Non-techies]
Security
Introduction to Software Reverse Engineering [To Non-techies]
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/662905fdd63cd54c43f66423_Screenshot%202024-04-24%20091451%20(1).jpg)
ByÂ
Gil Dabah
April 24, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/660a54e1c366e25e911cc975_appsec-for-data.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/660a54e1c366e25e911cc975_appsec-for-data.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/660a54e1c366e25e911cc975_appsec-for-data.png)
A New Emerging Data Security Category: AppSec for Data
Security
A New Emerging Data Security Category: AppSec for Data
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/660a54e1c366e25e911cc975_appsec-for-data.png)
ByÂ
Gil Dabah
April 1, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6602e1feb2dc4f3afddade13_PCI%20checklist.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6602e1feb2dc4f3afddade13_PCI%20checklist.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6602e1feb2dc4f3afddade13_PCI%20checklist.png)
PCI DSS Compliance Checklist: The 12 Requirements [2024]
Security
PCI DSS Compliance Checklist: The 12 Requirements [2024]
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6602e1feb2dc4f3afddade13_PCI%20checklist.png)
ByÂ
David Erel
March 26, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65f9465c1222f97de39fac55_pii-security-best-practices-featured-image.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65f9465c1222f97de39fac55_pii-security-best-practices-featured-image.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65f9465c1222f97de39fac55_pii-security-best-practices-featured-image.png)
How to Protect Personally Identifiable Information: PII Security Best Practices
Privacy
How to Protect Personally Identifiable Information: PII Security Best Practices
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65f9465c1222f97de39fac55_pii-security-best-practices-featured-image.png)
ByÂ
Gil Dabah
March 14, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65f1b89f131f1496186715f9_what-is-data-leakage-featured-image.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65f1b89f131f1496186715f9_what-is-data-leakage-featured-image.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65f1b89f131f1496186715f9_what-is-data-leakage-featured-image.png)
What Is Data Leakage? Types, Causes & Prevention
Security
What Is Data Leakage? Types, Causes & Prevention
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65f1b89f131f1496186715f9_what-is-data-leakage-featured-image.png)
ByÂ
Gil Dabah
February 13, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65ccace1641ffcde77a878bf_secure-sensitive%20user-profile-attributes.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65ccace1641ffcde77a878bf_secure-sensitive%20user-profile-attributes.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65ccace1641ffcde77a878bf_secure-sensitive%20user-profile-attributes.png)
Secure Sensitive User Profile Attributes in Auth0 (and other providers)
Privacy
Secure Sensitive User Profile Attributes in Auth0 (and other providers)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65ccace1641ffcde77a878bf_secure-sensitive%20user-profile-attributes.png)
ByÂ
Moty Michaely
February 6, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/659d72f1a6c70aa9dcb0e546_data-leaks-featured-image.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/659d72f1a6c70aa9dcb0e546_data-leaks-featured-image.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/659d72f1a6c70aa9dcb0e546_data-leaks-featured-image.jpg)
Data Leak vs Data Breach: What's the Difference? [With Examples]
Security
Data Leak vs Data Breach: What's the Difference? [With Examples]
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/659d72f1a6c70aa9dcb0e546_data-leaks-featured-image.jpg)
ByÂ
Gil Dabah
January 9, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65a4ff159d8fd164579db985_threats-to-personal-data.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65a4ff159d8fd164579db985_threats-to-personal-data.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65a4ff159d8fd164579db985_threats-to-personal-data.jpg)
The Rise in Threats to Personal Data: Takeaways from Apple’s Dec 2023 Report
Security
The Rise in Threats to Personal Data: Takeaways from Apple’s Dec 2023 Report
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65a4ff159d8fd164579db985_threats-to-personal-data.jpg)
ByÂ
Ariel Shiftan
January 8, 2024
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65917bb575d5e39ab95fa023_65857a0817542da113b85e95_piiano-flow-screenshot.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65917bb575d5e39ab95fa023_65857a0817542da113b85e95_piiano-flow-screenshot.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65917bb575d5e39ab95fa023_65857a0817542da113b85e95_piiano-flow-screenshot.jpg)
How I Detected Sensitive Data Leaks, Such as Log Leaks in Open Source Projects Using Piiano Flows
Privacy
How I Detected Sensitive Data Leaks, Such as Log Leaks in Open Source Projects Using Piiano Flows
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65917bb575d5e39ab95fa023_65857a0817542da113b85e95_piiano-flow-screenshot.jpg)
ByÂ
Guy Feigenblat
December 22, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/656a19bd9eadc2ac54fd20f4_broken-key.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/656a19bd9eadc2ac54fd20f4_broken-key.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/656a19bd9eadc2ac54fd20f4_broken-key.jpg)
Avoid Building Your Backend Applications with Encryption Failures
Security
Avoid Building Your Backend Applications with Encryption Failures
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/656a19bd9eadc2ac54fd20f4_broken-key.jpg)
ByÂ
Gil Dabah
December 1, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/655e35bf7818c58d5d408c46_globkey.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/655e35bf7818c58d5d408c46_globkey.jpg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/655e35bf7818c58d5d408c46_globkey.jpg)
Case Study: Data Sovereignty and Security Across Multiple Regions with Piiano Vault
Security
Case Study: Data Sovereignty and Security Across Multiple Regions with Piiano Vault
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/655e35bf7818c58d5d408c46_globkey.jpg)
ByÂ
Gil Dabah
November 21, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/654a42051c45fa2a28f538ad_data-minimization-how-less-is-more-in-data-privacy.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/654a42051c45fa2a28f538ad_data-minimization-how-less-is-more-in-data-privacy.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/654a42051c45fa2a28f538ad_data-minimization-how-less-is-more-in-data-privacy.webp)
What is Data Minimization? Main Principles & Techniques
Privacy
What is Data Minimization? Main Principles & Techniques
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/654a42051c45fa2a28f538ad_data-minimization-how-less-is-more-in-data-privacy.webp)
ByÂ
Gil Dabah
November 20, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65323f0c53e01bf83bf02145_id-theft.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65323f0c53e01bf83bf02145_id-theft.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65323f0c53e01bf83bf02145_id-theft.webp)
Secure Social Security Numbers in 6 Simple Steps for Developers
Security
Secure Social Security Numbers in 6 Simple Steps for Developers
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65323f0c53e01bf83bf02145_id-theft.webp)
ByÂ
Ariel Shiftan
October 19, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/651d083482c8c5daa7b5c01f_application-security-essentials.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/651d083482c8c5daa7b5c01f_application-security-essentials.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/651d083482c8c5daa7b5c01f_application-security-essentials.webp)
Application Security Essentials for Protecting Data for Developers
Security
Application Security Essentials for Protecting Data for Developers
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/651d083482c8c5daa7b5c01f_application-security-essentials.webp)
ByÂ
Gil Dabah
October 4, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64f6cbe70cb91385bbc0783a_pii-encryption-featured-image.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64f6cbe70cb91385bbc0783a_pii-encryption-featured-image.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64f6cbe70cb91385bbc0783a_pii-encryption-featured-image.webp)
PII Encryption: The Key to Protecting Your Customers’ Privacy
Security
PII Encryption: The Key to Protecting Your Customers’ Privacy
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64f6cbe70cb91385bbc0783a_pii-encryption-featured-image.webp)
ByÂ
Ariel Shiftan
September 5, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64e85fd51d7695f4e2dee596_data-tokenization-featured-image.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64e85fd51d7695f4e2dee596_data-tokenization-featured-image.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64e85fd51d7695f4e2dee596_data-tokenization-featured-image.png)
What is Data Tokenization? Everything You Need to Know
Security
What is Data Tokenization? Everything You Need to Know
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64e85fd51d7695f4e2dee596_data-tokenization-featured-image.png)
ByÂ
Gil Dabah
August 25, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64d2494f5487d69173c6f4f8_image%20(16).webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64d2494f5487d69173c6f4f8_image%20(16).webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64d2494f5487d69173c6f4f8_image%20(16).webp)
Exploring approaches to field-level encryption in Python for Django applications
Privacy
Exploring approaches to field-level encryption in Python for Django applications
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/64d2494f5487d69173c6f4f8_image%20(16).webp)
ByÂ
Imri Goldberg
August 1, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6491e723189f5c8eb01f3a8c_aws-kms.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6491e723189f5c8eb01f3a8c_aws-kms.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6491e723189f5c8eb01f3a8c_aws-kms.webp)
AWS KMS vs Piiano Vault: Which Encryption Mechanism to Choose for Your PII Data
Privacy Engineering
AWS KMS vs Piiano Vault: Which Encryption Mechanism to Choose for Your PII Data
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/6491e723189f5c8eb01f3a8c_aws-kms.webp)
ByÂ
David Erel
June 20, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf24006749d638431a05d_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf24006749d638431a05d_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf24006749d638431a05d_Blog%20Thumbnail.webp)
Column-Level Encryption 101: What is It, implementation & Benefits
Security
Column-Level Encryption 101: What is It, implementation & Benefits
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf24006749d638431a05d_Blog%20Thumbnail.webp)
ByÂ
Ariel Shiftan
June 20, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/646cd96b834a3e8d2f901664_Key%20Rotation%20for%20Data.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/646cd96b834a3e8d2f901664_Key%20Rotation%20for%20Data.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/646cd96b834a3e8d2f901664_Key%20Rotation%20for%20Data.webp)
The Importance of Key Rotation for Data Security
Security
The Importance of Key Rotation for Data Security
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/646cd96b834a3e8d2f901664_Key%20Rotation%20for%20Data.webp)
ByÂ
Ariel Shiftan
May 23, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d085a323258f362038629_cloudsec.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d085a323258f362038629_cloudsec.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d085a323258f362038629_cloudsec.png)
What is Cloud Application Security? Challenges & Best Practices
Security
What is Cloud Application Security? Challenges & Best Practices
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d085a323258f362038629_cloudsec.png)
ByÂ
Ariel Shiftan
April 9, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0859a93702a12fc989d7_PbD-vs-SbD.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0859a93702a12fc989d7_PbD-vs-SbD.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0859a93702a12fc989d7_PbD-vs-SbD.jpeg)
Privacy by Design vs Security by Design: What’s the Difference?
Privacy
Privacy by Design vs Security by Design: What’s the Difference?
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0859a93702a12fc989d7_PbD-vs-SbD.jpeg)
ByÂ
Gil Dabah
February 7, 2023
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0859f4dbba9dd952e983_developers-are-the-new-data-protectors.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0859f4dbba9dd952e983_developers-are-the-new-data-protectors.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0859f4dbba9dd952e983_developers-are-the-new-data-protectors.jpeg)
Why Are Developers the New Data Protectors?
Privacy Engineering
Why Are Developers the New Data Protectors?
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0859f4dbba9dd952e983_developers-are-the-new-data-protectors.jpeg)
ByÂ
Gil Dabah
December 4, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf47a5006b3b8d5bd3128_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf47a5006b3b8d5bd3128_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf47a5006b3b8d5bd3128_Blog%20Thumbnail.webp)
Building vs. Buying a Data Privacy Vault to Protect Sensitive Data
Privacy Engineering
Building vs. Buying a Data Privacy Vault to Protect Sensitive Data
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf47a5006b3b8d5bd3128_Blog%20Thumbnail.webp)
ByÂ
David Erel
November 30, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d085973bc0a733b97a5ee_digital-footprint.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d085973bc0a733b97a5ee_digital-footprint.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d085973bc0a733b97a5ee_digital-footprint.jpeg)
What Is a PII Digital Footprint and How to Reduce It
Privacy
What Is a PII Digital Footprint and How to Reduce It
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d085973bc0a733b97a5ee_digital-footprint.jpeg)
ByÂ
Ariel Shiftan
November 17, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf514d6160f417e95c37a_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf514d6160f417e95c37a_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf514d6160f417e95c37a_Blog%20Thumbnail.webp)
What is Data Protection & Why is it Important?
Privacy
What is Data Protection & Why is it Important?
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf514d6160f417e95c37a_Blog%20Thumbnail.webp)
ByÂ
Ariel Shiftan
October 27, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08582905c605414f816f_Secure-PII.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08582905c605414f816f_Secure-PII.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08582905c605414f816f_Secure-PII.png)
How to Secure Personally Identifiable Information: 3 Main Steps
Security
How to Secure Personally Identifiable Information: 3 Main Steps
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08582905c605414f816f_Secure-PII.png)
ByÂ
Ariel Shiftan
August 25, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65095f9b772c3cdd8f10fce6_what-is-pii-data.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65095f9b772c3cdd8f10fce6_what-is-pii-data.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65095f9b772c3cdd8f10fce6_what-is-pii-data.webp)
What Is PII Data and How Can You Protect It?
Privacy
What Is PII Data and How Can You Protect It?
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/65095f9b772c3cdd8f10fce6_what-is-pii-data.webp)
ByÂ
Gil Dabah
August 9, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08575bafca1c9fc3e551_PII-Protection-Solution.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08575bafca1c9fc3e551_PII-Protection-Solution.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08575bafca1c9fc3e551_PII-Protection-Solution.png)
PII Protection Solution: How to Chose One, Threats & Solutions
Security
PII Protection Solution: How to Chose One, Threats & Solutions
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08575bafca1c9fc3e551_PII-Protection-Solution.png)
ByÂ
Gil Dabah
August 4, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0857fb99415f935e4228_Go-Timeouts.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0857fb99415f935e4228_Go-Timeouts.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0857fb99415f935e4228_Go-Timeouts.png)
Golang Timeout Handling: 5 Practical Lessons
Engineering
Golang Timeout Handling: 5 Practical Lessons
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0857fb99415f935e4228_Go-Timeouts.png)
ByÂ
Imri Goldberg
June 20, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0857ff18bfca39b6a9cb_Report-a-data-breach.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0857ff18bfca39b6a9cb_Report-a-data-breach.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0857ff18bfca39b6a9cb_Report-a-data-breach.png)
How to Report a Data Breach: Step-by-Step Guide
Privacy
How to Report a Data Breach: Step-by-Step Guide
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0857ff18bfca39b6a9cb_Report-a-data-breach.png)
ByÂ
Ariel Shiftan
June 12, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf5c9976f3a3f954c243e_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf5c9976f3a3f954c243e_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf5c9976f3a3f954c243e_Blog%20Thumbnail.webp)
How to Protect Social Security Number (SSN): Everything You Need to Know
Security
How to Protect Social Security Number (SSN): Everything You Need to Know
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf5c9976f3a3f954c243e_Blog%20Thumbnail.webp)
ByÂ
Gil Dabah
June 12, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf69106749d63843744fb_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf69106749d63843744fb_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf69106749d63843744fb_Blog%20Thumbnail.webp)
Geeking Out On Privacy with TROPT
Privacy
Geeking Out On Privacy with TROPT
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf69106749d63843744fb_Blog%20Thumbnail.webp)
ByÂ
Gil Dabah
April 20, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf73f0081298d624b9303_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf73f0081298d624b9303_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf73f0081298d624b9303_Blog%20Thumbnail.webp)
Privacy by Design Checklist for Developers
Privacy Engineering
Privacy by Design Checklist for Developers
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf73f0081298d624b9303_Blog%20Thumbnail.webp)
ByÂ
Ariel Shiftan
February 6, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf7cd78d90b1aba9bb85f_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf7cd78d90b1aba9bb85f_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf7cd78d90b1aba9bb85f_Blog%20Thumbnail.webp)
History of Privacy: Past, Present & Predictions for the Future
Privacy
History of Privacy: Past, Present & Predictions for the Future
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf7cd78d90b1aba9bb85f_Blog%20Thumbnail.webp)
ByÂ
Gil Dabah
January 28, 2022
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08555bafca1c9fc3e2a4_developers.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08555bafca1c9fc3e2a4_developers.png)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08555bafca1c9fc3e2a4_developers.png)
Why Developers Should Join the Privacy Round Table
Privacy Engineering
Why Developers Should Join the Privacy Round Table
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d08555bafca1c9fc3e2a4_developers.png)
ByÂ
Gil Dabah
December 20, 2021
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0856f8f2b42feafed5ed_gibbrish.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0856f8f2b42feafed5ed_gibbrish.jpeg)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0856f8f2b42feafed5ed_gibbrish.jpeg)
How to Keep Personal Data Secure Online? Pseudonymize it
Privacy
How to Keep Personal Data Secure Online? Pseudonymize it
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/645d0856f8f2b42feafed5ed_gibbrish.jpeg)
ByÂ
Ariel Shiftan
December 7, 2021
Text Link![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf83ce46ebc6622116852_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf83ce46ebc6622116852_Blog%20Thumbnail.webp)
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf83ce46ebc6622116852_Blog%20Thumbnail.webp)
The Black Shadow Case - a Zero Privacy Risk Alternative
Security
The Black Shadow Case - a Zero Privacy Risk Alternative
![](https://cdn.prod.website-files.com/643ecd9741729f79fa6746ee/649bf83ce46ebc6622116852_Blog%20Thumbnail.webp)
ByÂ
Ariel Shiftan
November 18, 2021
No articles found.
Join our newsletter
Get security and privacy best practices, tips, and news.
We care about your data in our privacy policy
Oops! Something went wrong while submitting the form.
Join our newsletter
Get security and privacy best practices, tips and news.
Your privacy is important to us, privacy policy.
Featured resources
See all resources