Featured articles
Latest articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Text Link
Comparing Dynamic Data Masking Proxy to Data Privacy Vault
Comparing Dynamic Data Masking Proxy to Data Privacy Vault
By
Gil Dabah
October 25, 2024
Text Link
5 Tokenization Types Demonstrated Using Piiano Vault
Engineering
5 Tokenization Types Demonstrated Using Piiano Vault
By
Ariel Shiftan
September 19, 2024
Text Link
Why Spilling PII to Logs Is Bad and How To Avoid It
Engineering
Why Spilling PII to Logs Is Bad and How To Avoid It
By
Ariel Shiftan
September 2, 2024
Text Link
The Key Advantages of Data Privacy Vaults Over Traditional Databases
Security
The Key Advantages of Data Privacy Vaults Over Traditional Databases
By
Ariel Shiftan
August 1, 2024
Text Link
Understanding Encryption at Rest and Beyond: Strengths and Weaknesses
Security
Understanding Encryption at Rest and Beyond: Strengths and Weaknesses
By
Gil Dabah
July 30, 2024
Text Link
Use Piiano Vault to protect your customers’ secrets with encryption or tokenization
Privacy
Use Piiano Vault to protect your customers’ secrets with encryption or tokenization
By
Moty Michaely
July 17, 2024
Text Link
What is Application Level Encryption? Benefits & Implementation
Security
What is Application Level Encryption? Benefits & Implementation
By
Ariel Shiftan
June 27, 2024
Text Link
Automated Code Audits: Tools, Types, and Benefits
Security
Automated Code Audits: Tools, Types, and Benefits
By
Gil Dabah
June 20, 2024
Text Link
News - Piiano Achieves PCI DSS and SOC2 Certification
Security
News - Piiano Achieves PCI DSS and SOC2 Certification
By
Gil Dabah
June 3, 2024
Text Link
How to Protect Customers' Secrets in Your SaaS Offering: Detailed Guide
Privacy
How to Protect Customers' Secrets in Your SaaS Offering: Detailed Guide
By
Moty Michaely
May 3, 2024
Text Link
Piiano Vault Architecture – 60K RPS, 300 million rows, low latency w/PostgreSQL
Security
Piiano Vault Architecture – 60K RPS, 300 million rows, low latency w/PostgreSQL
By
David Erel
May 1, 2024
Text Link
Introduction to Software Reverse Engineering [To Non-techies]
Security
Introduction to Software Reverse Engineering [To Non-techies]
By
Gil Dabah
April 24, 2024
Text Link
A New Emerging Data Security Category: AppSec for Data
Security
A New Emerging Data Security Category: AppSec for Data
By
Gil Dabah
April 1, 2024
Text Link
PCI DSS Compliance Checklist: The 12 Requirements [2024]
Security
PCI DSS Compliance Checklist: The 12 Requirements [2024]
By
David Erel
March 26, 2024
Text Link
How to Protect Personally Identifiable Information: PII Security Best Practices
Privacy
How to Protect Personally Identifiable Information: PII Security Best Practices
By
Gil Dabah
March 14, 2024
Text Link
What Is Data Leakage? Types, Causes & Prevention
Security
What Is Data Leakage? Types, Causes & Prevention
By
Gil Dabah
February 13, 2024
Text Link
Secure Sensitive User Profile Attributes in Auth0 (and other providers)
Privacy
Secure Sensitive User Profile Attributes in Auth0 (and other providers)
By
Moty Michaely
February 6, 2024
Text Link
Data Leak vs Data Breach: What's the Difference? [With Examples]
Security
Data Leak vs Data Breach: What's the Difference? [With Examples]
By
Gil Dabah
January 9, 2024
Text Link
The Rise in Threats to Personal Data: Takeaways from Apple’s Dec 2023 Report
Security
The Rise in Threats to Personal Data: Takeaways from Apple’s Dec 2023 Report
By
Ariel Shiftan
January 8, 2024
Text Link
How I Detected Sensitive Data Leaks, Such as Log Leaks in Open Source Projects Using Piiano Flows
Privacy
How I Detected Sensitive Data Leaks, Such as Log Leaks in Open Source Projects Using Piiano Flows
By
Guy Feigenblat
December 22, 2023
Text Link
Avoid Building Your Backend Applications with Encryption Failures
Security
Avoid Building Your Backend Applications with Encryption Failures
By
Gil Dabah
December 1, 2023
Text Link
Case Study: Data Sovereignty and Security Across Multiple Regions with Piiano Vault
Security
Case Study: Data Sovereignty and Security Across Multiple Regions with Piiano Vault
By
Gil Dabah
November 21, 2023
Text Link
What is Data Minimization? Main Principles & Techniques
Privacy
What is Data Minimization? Main Principles & Techniques
By
Gil Dabah
November 20, 2023
Text Link
Secure Social Security Numbers in 6 Simple Steps for Developers
Security
Secure Social Security Numbers in 6 Simple Steps for Developers
By
Ariel Shiftan
October 19, 2023
Text Link
Application Security Essentials for Protecting Data for Developers
Security
Application Security Essentials for Protecting Data for Developers
By
Gil Dabah
October 4, 2023
Text Link
PII Encryption: The Key to Protecting Your Customers’ Privacy
Security
PII Encryption: The Key to Protecting Your Customers’ Privacy
By
Ariel Shiftan
September 5, 2023
Text Link
What is Data Tokenization? Everything You Need to Know
Security
What is Data Tokenization? Everything You Need to Know
By
Gil Dabah
August 25, 2023
Text Link
Exploring approaches to field-level encryption in Python for Django applications
Privacy
Exploring approaches to field-level encryption in Python for Django applications
By
Imri Goldberg
August 1, 2023
Text Link
AWS KMS vs Piiano Vault: Which Encryption Mechanism to Choose for Your PII Data
Privacy Engineering
AWS KMS vs Piiano Vault: Which Encryption Mechanism to Choose for Your PII Data
By
David Erel
June 20, 2023
Text Link
Column-Level Encryption 101: What is It, implementation & Benefits
Security
Column-Level Encryption 101: What is It, implementation & Benefits
By
Ariel Shiftan
June 20, 2023
Text Link
The Importance of Key Rotation for Data Security
Security
The Importance of Key Rotation for Data Security
By
Ariel Shiftan
May 23, 2023
Text Link
What is Cloud Application Security? Challenges & Best Practices
Security
What is Cloud Application Security? Challenges & Best Practices
By
Ariel Shiftan
April 9, 2023
Text Link
Privacy by Design vs Security by Design: What’s the Difference?
Privacy
Privacy by Design vs Security by Design: What’s the Difference?
By
Gil Dabah
February 7, 2023
Text Link
Why Are Developers the New Data Protectors?
Privacy Engineering
Why Are Developers the New Data Protectors?
By
Gil Dabah
December 4, 2022
Text Link
Building vs. Buying a Data Privacy Vault to Protect Sensitive Data
Privacy Engineering
Building vs. Buying a Data Privacy Vault to Protect Sensitive Data
By
David Erel
November 30, 2022
Text Link
What Is a PII Digital Footprint and How to Reduce It
Privacy
What Is a PII Digital Footprint and How to Reduce It
By
Ariel Shiftan
November 17, 2022
Text Link
What is Data Protection & Why is it Important?
Privacy
What is Data Protection & Why is it Important?
By
Ariel Shiftan
October 27, 2022
Text Link
How to Secure Personally Identifiable Information: 3 Main Steps
Security
How to Secure Personally Identifiable Information: 3 Main Steps
By
Ariel Shiftan
August 25, 2022
Text Link
What Is PII Data and How Can You Protect It?
Privacy
What Is PII Data and How Can You Protect It?
By
Gil Dabah
August 9, 2022
Text Link
PII Protection Solution: How to Chose One, Threats & Solutions
Security
PII Protection Solution: How to Chose One, Threats & Solutions
By
Gil Dabah
August 4, 2022
Text Link
Golang Timeout Handling: 5 Practical Lessons
Engineering
Golang Timeout Handling: 5 Practical Lessons
By
Imri Goldberg
June 20, 2022
Text Link
How to Report a Data Breach: Step-by-Step Guide
Privacy
How to Report a Data Breach: Step-by-Step Guide
By
Ariel Shiftan
June 12, 2022
Text Link
How to Protect Social Security Number (SSN): Everything You Need to Know
Security
How to Protect Social Security Number (SSN): Everything You Need to Know
By
Gil Dabah
June 12, 2022
Text Link
Geeking Out On Privacy with TROPT
Privacy
Geeking Out On Privacy with TROPT
By
Gil Dabah
April 20, 2022
Text Link
Privacy by Design Checklist for Developers
Privacy Engineering
Privacy by Design Checklist for Developers
By
Ariel Shiftan
February 6, 2022
Text Link
History of Privacy: Past, Present & Predictions for the Future
Privacy
History of Privacy: Past, Present & Predictions for the Future
By
Gil Dabah
January 28, 2022
Text Link
Why Developers Should Join the Privacy Round Table
Privacy Engineering
Why Developers Should Join the Privacy Round Table
By
Gil Dabah
December 20, 2021
Text Link
How to Keep Personal Data Secure Online? Pseudonymize it
Privacy
How to Keep Personal Data Secure Online? Pseudonymize it
By
Ariel Shiftan
December 7, 2021
Text Link
The Black Shadow Case - a Zero Privacy Risk Alternative
Security
The Black Shadow Case - a Zero Privacy Risk Alternative
By
Ariel Shiftan
November 18, 2021
No articles found.
Join our newsletter
Get security and privacy best practices, tips, and news.
We care about your data in our privacy policy
Oops! Something went wrong while submitting the form.
Join our newsletter
Get security and privacy best practices, tips and news.
Your privacy is important to us, privacy policy.
Featured resources
See all resources