Blog

Where is sensitive data stored?

We are all aware up to a certain point that we have sensitive data in our databases, but do we know where it is and what data do we have? To get a better picture of this situation, let’s follow the simile:

Imagine that you move to a new house. […]

Read more...

Sensitive Data Inventory

This is a key piece of information in the datamasking implementation project, which will be involved in every stage of the project and constantly updated.
The purpose
We need this document, so we know what information the company is interested in protecting.
Some of it might be due to legal requirements, but […]

Read more...

The ball starts to roll

After an exhaustive and sucessful Proof of Concept, the kick-off meeting is the first milestone of the real implementation project. The project team -client and netZima – had been working together for a while, so we know one another and the working atmosphere is great.
We are very confident this […]

Read more...

Why risking your sensitive data for nothing?

In 2015, Jeb Bush published Reply All. A book that gathers a wide sample of email exchanges with Florida journalists, businessmen and everyday citizens while Bush was Florida governor. The book was meant to help relaunch a struggling campaign, by tapping on transparency.
But there was a problem.
As The Washington Post […]

Read more...

icaria technology at Testing & Tools Day

icaria technology will be present at the V edition of Testing & Tools Day. We will be talking about GDPR and some of the solutions icaria Mirage provides when it comes to sensitive information data masking. We will share our most relevant and recent experiences working with some of […]

Read more...