The Anonomatic Blog

Thoughts and tips to help you solve Personally Identifiable Information (PII) compliance

Subscribe to get the latest content in your inbox

  • PII Compliance
  • PII-as-a-Service™
  • Inside Anonomatic

Subscribtion

  • This field is hidden when viewing the form
Customer Success Story

Customer Success Story

Anonomatic was invited to present a customer success story at Teradata Possible 2024. Anonomatic worked with Teradata and the customer, C&A Mexico to install, validate and operationalize the solution in just two weeks! See the entire presentation here

Training Your AI with Identified Data Safely

Training Your AI with Identified Data Safely

AI is not only the easiest new trend to spell, it is also making the biggest promises and getting the most investment of any new tech, ever.  So, what is keeping it back? The answer is also easy to spell, PII. The reality is that even with all the potential, all...

Answering Unanswerable Questions

Answering Unanswerable Questions

“No, you can’t have that data!” This is what far too many people get as an answer when they ask for access to sensitive data. But imagine if you were told you had to get huge amounts of highly sensitive, strictly regulated data and it was your job to keep it safe...

Keeping Data Private from I.T.

Keeping Data Private from I.T.

Your tech staff doesn't need to see production data - really, they don't. Implementing effective data privacy may seem like a daunting task. Constantly evolving national and international regulations like GDPR and CPRA make keeping up with the rules a heavy burden. At...

Data Extortion is Real. So is the Protection.

Data Extortion is Real. So is the Protection.

Hackers have moved from Ransomware to Data Extortion. The good news is you can ignore them. Congratulations. You hardened your systems against ransomware. Now, if you are hit, you can restore your systems and don’t have to pay. Well done. However, hackers have morphed...

Data Privacy Experts are Asking the Wrong Question

Data Privacy Experts are Asking the Wrong Question

The core concern of Data Privacy is protecting the privacy of individuals. In the world of electronic data, this always meant enacting manual processes and technical solutions with the intent of limiting who can access data, when that data is allowed to be accessed,...

Hackers Want Your Encrypted Data

Hackers Want Your Encrypted Data

An interesting trend is taking place in the world of data hacking. Hackers are greedily collecting untold volumes of encrypted data knowing they cannot use it today. While this may seem confusing, it is no surprise to many data security professionals, and it can only...

Anonomatic Could Save the U.S. Economy $100B+ a Year!

Anonomatic Could Save the U.S. Economy $100B+ a Year!

Federal data privacy laws have been slowly moving through congress for years and there has been real progress made recently, with a bi-lateral agreement called the American Data Privacy and Protection. But not everyone has been waiting for the law to be passed before...

Data Mesh and Data Privacy – You CAN Have Both

Data Mesh and Data Privacy – You CAN Have Both

When I was first introduced to the idea of data meshes, I thought it was one of those incredibly brilliant ideas which simply took someone clever enough to look at a common problem from an uncommon perspective. According to Starburst.io, data mesh is a new approach...