Blog

Reinforced door, the keys at building desk

For some years now, armored doors are common in the access to houses. It can be said that it is a reasonable security measure, in terms of efficiency (security results obtained against cost). I do remember that for a long time these new doors coexisted with the old practice of leaving a copy of the keys in the gatehouse, perfectly signaling the house address, in an unlocked box and with the only protection of...

Where is sensitive data stored?

We are all aware up to a certain point that we have sensitive data in our databases, but do we know where it is and what data do we have? To get a better picture of this situation, let’s follow the simile: Imagine that you move to a new house. You start organizing your home in the best possible way, placing everything as you would like to find it, knowing where you leave your belongings...

Sensitive Data Inventory

This is a key piece of information in the datamasking implementation project, which will be involved in every stage of the project and constantly updated. The purpose We need this document, so we know what information the company is interested in protecting. Some of it might be due to legal requirements, but there also might be reasons for masking other information, regardless of its legal condition. Such as privacy for non-allowed personnel. This document also gathers information about...

The ball starts to roll

After an exhaustive and sucessful Proof of Concept, the kick-off meeting is the first milestone of the real implementation project. The project team -client and netZima - had been working together for a while, so we know one another and the working atmosphere is great. We are very confident this project will be a technical challenge (where is the fun, if otherwise?) but also a success. But first things, first. The kick-off meeting is not...

Why risking your sensitive data for nothing?

In 2015, Jeb Bush published Reply All. A book that gathers a wide sample of email exchanges with Florida journalists, businessmen and everyday citizens while Bush was Florida governor. The book was meant to help relaunch a struggling campaign, by tapping on transparency. But there was a problem. As The Washington Post put it: "The e-mails all contain unredacted e-mail addresses, details about business operations and, according to the Verge, even Social Security numbers" This became an embarrassing...

icaria technology at Testing & Tools Day

icaria technology will be present at the V edition of Testing & Tools Day. We will be talking about GDPR and some of the solutions icaria Mirage provides when it comes to sensitive information data masking. We will share our most relevant and recent experiences working with some of the most important companies in Spain. The event will take place at Madrid on October, 18. We are looking to hear from you at icaria technology stand!