The Anonomatic Blog

Thoughts and tips to help you solve Personally Identifiable Information (PII) compliance

Subscribe to get the latest content in your inbox

  • PII Compliance
  • PII-as-a-Service™
  • Inside Anonomatic

Subscribtion

  • Hidden

Most Recent Post

Training Your AI with Identified Data Safely

Training Your AI with Identified Data Safely

AI is not only the easiest new trend to spell, it is also making the biggest promises and getting the most investment of any new tech, ever.  So, what is keeping it back? The answer is also easy to spell, PII. The reality is that even with all the potential, all...

Answering Unanswerable Questions

Answering Unanswerable Questions

“No, you can’t have that data!” This is what far too many people get as an answer when they ask for access to sensitive data. But imagine if you were told you had to get huge amounts of highly sensitive, strictly regulated data and it was your job to keep it safe...

Keeping Data Private from I.T.

Keeping Data Private from I.T.

Your tech staff doesn't need to see production data - really, they don't. Implementing effective data privacy may seem like a daunting task. Constantly evolving national and international regulations like GDPR and CPRA make keeping up with the rules a heavy burden. At...

Data Extortion is Real. So is the Protection.

Data Extortion is Real. So is the Protection.

Hackers have moved from Ransomware to Data Extortion. The good news is you can ignore them. Congratulations. You hardened your systems against ransomware. Now, if you are hit, you can restore your systems and don’t have to pay. Well done. However, hackers have morphed...

Data Privacy Experts are Asking the Wrong Question

Data Privacy Experts are Asking the Wrong Question

The core concern of Data Privacy is protecting the privacy of individuals. In the world of electronic data, this always meant enacting manual processes and technical solutions with the intent of limiting who can access data, when that data is allowed to be accessed,...

Hackers Want Your Encrypted Data

Hackers Want Your Encrypted Data

An interesting trend is taking place in the world of data hacking. Hackers are greedily collecting untold volumes of encrypted data knowing they cannot use it today. While this may seem confusing, it is no surprise to many data security professionals, and it can only...

Anonomatic Could Save the U.S. Economy $100B+ a Year!

Anonomatic Could Save the U.S. Economy $100B+ a Year!

Federal data privacy laws have been slowly moving through congress for years and there has been real progress made recently, with a bi-lateral agreement called the American Data Privacy and Protection. But not everyone has been waiting for the law to be passed before...

Data Mesh and Data Privacy – You CAN Have Both

Data Mesh and Data Privacy – You CAN Have Both

When I was first introduced to the idea of data meshes, I thought it was one of those incredibly brilliant ideas which simply took someone clever enough to look at a common problem from an uncommon perspective. According to Starburst.io, data mesh is a new approach...

Is your PII threatened from all sides?

Is your PII threatened from all sides?

There's a new sheriff in townSheriff Bart Does this sound familiar to you? You are asked to help with a problem, maybe a really big problem. So, you hop on your horse, ride into town, expecting to make life better for everyone when you get to work. But instead of a...

Anonomatic – Never rush a miracle

Anonomatic – Never rush a miracle

Quote of the Day: “You rush a miracle man, you get a rotten miracle”Miracle Max, The Princess Bride When you start a new company, especially if you are trying to do something no one has ever done before, a common question you get asked is “who are you guys and where...